Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Data breaches in 2013 exposed 14% of all debit cards
Financial institutions weathered the Target data breach and are looking for solutions to enhance security, with many issuers now planning to implement EMV debit, according to …
Invasive Selfmite SMS worm uncovered
AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …
Cryptome down, founder blames ISP
Cryptome, the well-known and long-lived online repository for information about freedom of speech, cryptography, spying, and surveillance, is down due to a potentially …
1.3M personal records exposed in Montana data breach
1.3 million people will be notified that hackers gained entry to a State of Montana’s Department of Public Health and Human Services (DPHHS) computer server, state …
Atypical cloned banking app pops up on Google Play
An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users’ ID, and leaves alone the password. The …
Banking fraud campaign steals 500k euros in a week
The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the …
Drastic decline in vulnerable NTP servers due to Heartbleed?
In light of the escalation of DDoS attacks used as a means of extorting money from online businesses, the news that there has been a significant decrease in vulnerable Network …
Companies are afraid of the cloud
Although using cloud solutions can boost company efficiency, not every business has made the jump to cloud services. In a recent F-Secure survey of companies with up to 500 …
(IN)SECURE Magazine issue 42 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 42 has been released today. Table of contents: Six …
Top 10 technologies for information security in 2014
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …
Are CISOs too confident?
CISOs and IT managers may be too confident in their capabilities to ensure their organizations security and defenses against a data breach, according to Courion. A majority …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground