Malicious Tor exit node is run by MiniDuke APT actors
The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …
How to become an ISO 27001 / ISO 22301 consultant
If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …
Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Darkhotel espionage campaign targets corporate executives …
Default ATM passcodes still exploited by crooks
Once again, ATMs have been “hacked” by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn’t been guessed, or ended …
Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack
The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …
Facebook updates terms and policies, introduces interactive privacy guides
Facebook continues with its plan to make the social network’s privacy settings easier to understand, and has introduced Privacy Basics. Private Basics is a page where …
Toshiba and Cisco to collaborate on new ways to utilize IoT
Toshiba and Cisco are collaborating on new ways to utilize the Internet of Everything that can dramatically improve processes, productivity and experiences in manufacturing, …
Secure remote file access challenges
While the majority of full-time employees access files remotely (89%), nearly three-quarters (73%) still do so via email, and less than a quarter (22%) are aware of a …
Best practices for government agencies to secure IT infrastructure
Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their …
Americans’ privacy behaviors and attitudes in the post-Snowden era
Most Americans are aware of and worried about government efforts to monitor communications and access their data but, interestingly enough, they still look to the government …
ISPs are removing encryption from customers’ emails
A number of ISPs in the US and Thailand have recently been spotted actively removing encryption from their customers’ data sent to email servers, the Electronic Frontier …
Microsoft open sources .NET server stack
Microsoft open sourced the full server-side .NET stack and expanded .NET to run on the Linux and Mac OS platforms. The company also released Visual Studio Community 2013, a …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)