How email user habits impact personal life
GFI Software announced the findings of its second independent study into email user habits, which revealed a stark increase in the way that work email is encroaching into the …
65 challenges that cloud computing poses to forensics investigators
The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to …
Google goes to war against zero-days
Google has announced the launch of Project Zero, a dedicated internal team that will concentrate on finding zero-day vulnerabilities in Google’s and third-party software …
Breaches exposed 22.8 million personal records of New Yorkers
Attorney General Eric T. Schneiderman issued a new report examining the growing number, complexity, and costs of data breaches in the New York State. The report reveals that …
PittyTiger APT group sells its services to companies
APT attackers thought to be operating from China often seem financed by the government, but there are other groups that work for the highest bidder, which is usually a private …
CNET attacked by Russian hackers, user database stolen
Russian hacker group W0rm has apparently managed to breach servers belonging to media website CNET, and make off with databases containing usernames, emails, and encrypted …
Active Directory flaw impacts 95% of Fortune 1000 companies
Aorato identified a new threatening flaw within Active Directory that enables attackers to change a victim’s password, despite current security and identity theft …
96% of organizations hit by a security incident in the past year
A new ForeScout report revealed that more than 96 percent of organizations experienced a significant IT security incident in the past year. The majority of IT organizations …
CIOs should make digital business tech an IT responsibility
CIOs need to decide how they will position their IT organization in relation to emerging digital business technologies, such as the Internet of Things, 3D printing, wearable …
NIST releases report on cryptography expertise
NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …
Amazon-hosted malware triples in 6 months
Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top …
First aid kit for people who face digital threats
A group of NGOs that includes the EFF, Global Voices, and Internews, has launched the Digital First Aid Kit, an open source self-assessment tool for people who face digital …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)