Please turn on your JavaScript for this page to function normally.
Video: DIY Command & Control for fun and no profit

Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …

Internet sites “fingerprint” users by secretly collecting browser info

A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with …

Week in review: Dangerous vBulletin exploit in the wild, Blackhole exploit kit creator arrested

Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: How to establish trust in the cloud In order to enforce corporate …

The many security problems of ATMs

As much as they are useful, ATMs are also very vulnerable to tampering and attacks from individuals looking for money. eWeek reports that at the SecTor security conference …

Infographic: The nightmare of securing unstructured data

This infographic from SealPath comes with data and facts of data loss in enterprises: sources of data breaches, market trends, technologies related to data protection, etc. …

Facebook makes every user discoverable by name

Once again, Facebook is doing away with a feature that many users didn’t even know they could use, but a small, privacy-conscious minority is glad to have (had). Almost …

Tamper-resistant jailbreak detection from Arxan

Arxan announced new tamper-proof jailbreak detection security and environmental sensing technology. In addition to Arxan’s pre-existing Guards, which are running on over …

EFF leaves the Global Network Initiative

With an open letter addressed to members of the Board of Directors of the Global Network Initiative (GNI), the Electronic Frontiers Foundation (EFF) has officially resigned …

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …

Video: Stop making excuses, it’s time to own your high impact vulnerabilities

Most systems are insecure, not because we don’t know about or understand the vulnerability but because we fail at planning and communicating the solution to address or …

New approach for real-time security incident response

NetCitadel announced a new analytics-driven, context aware approach for protecting enterprise networks from increasingly sophisticated security attacks and APTs. The evolution …

Patched IE zero-day and older flaw exploited in ongoing targeted attacks

With this month’s Patch Tuesday, Microsoft has delivered the patch for the infamous Internet Explorer zero-day (CVE-2013-3893) that has been spotted being used in …

Don't miss

Cybersecurity news