Reactions to the eBay breach
A database containing eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth was compromised. Here are some of the …
More enterprises to adopt multi-factor authentication
Rising security risks, and demand for seamless and secure access across any device, anytime, has triggered greater adoption of authentication solutions. A new SafeNet survey …
Hybrid cloud computing success factors
In the past three years, private cloud computing has moved from an aspiration to a tentative reality for nearly half of the world’s large organizations. Hybrid cloud …
Company and employee disconnect on BYOD security policies
Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …
Stop all browser-borne malware from entering your network
In this podcast, recorded at Infosecurity Europe 2014, Branden Spikes, CEO, CTO & Founder of Spikes Security, talks about how malware has already done its job by the time …
AT&T hacker wants US govt to pay for the time he spent in prison
In an open letter addressed to members of the New Jersey District Court, FBI, and DOJ, Andrew “weev” Auernheimer is seeking monetary restitution for the time he …
eBay breached, change your password immediately
eBay has been hacked, and its customers are urged to change their account password as soon a possible. The attack, effected between late February and early March, resulted in …
Cybercrime attack targets, victims, motivations and methods
Trustwave experts gathered the data from 691 breach investigations (a 54 percent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned …
iBanking Android malware disguised as legitimate apps
On underground cybercrime markets, iBanking is a well-known piece of malware, and one of the most expensive ones, too. “iBanking often masquerades as legitimate social …
Some industrial systems still vulnerable to Heartbleed
The danger from Heartbleed has passed for most Internet users, but operators of Industrial Control Systems (ICS) are not that lucky. The US ICS CERT has issued on Tuesday an …
Insider threat and privileged user abuse
Despite heightened awareness of insider threats, most organizations continue to grapple with how to mitigate risks to their networks and sensitive information. According to a …
Facebook offers free browser-based malware scanner
People share via social media more than any other channel. But with social media exploits of personal and corporate accounts frequently making headlines, it’s time for …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)