Risky file sharing practices can cause data loss and compliance violations
Organizational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and that employees routinely breach IT …
Flaw in Visa’s contactless payment system could lead to fraud
Researchers from Newcastle University have discovered a serious flaw in Visa’s contactless credit cards which could allow attackers to siphon large amounts of money off …
Researchers audit the TextSecure encrypted messaging app
A group of German researchers have audited TextSecure, the popular open source encrypted messaging application for Android, and the news is good. After fixing a particular …
Facebook embraces Tor users, sets up onion address
While in the past Facebook has occasionally blocked Tor connections because of security considerations, the company has decided it will help Tor users from now on, and …
The psychology of Facebook scam victims
A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …
When to use tools for ISO 27001/ISO 22301 and when to avoid them
If you’re starting to implement complex standards like ISO 27001 or ISO 22301, you’re probably looking for a way to make your job easier. Who wouldn’t? After …
Week in review: Critical Drupal 7 vulnerability, cloud myths, Ebola scams
Here’s an overview of some of last week’s most interesting news and articles: Tor exit node found patching downloaded binaries with malware A researcher has …
Pirate Bay co-founder sentenced for hacking CSC servers
Pirate Bay co-founder Gottfrid Svartholm Warg has been found guilty of hacking into the mainframe of CSC, a company tasked with keeping and handling sensitive information …
Open source Knock Knock tool reveals OS X malware
At this year’s Virus Bulletin conference held last month in Seattle, security researcher Patrick Wardle spoke about methods of malware persistence on Mac OS X. The video …
Things that freak out IT security pros
Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware …
Android dialler hides, resists attempts to remove it
A malicious dialler disguised as an application for adults could become a big problem for Android users, as the malware systematically removes traces of itself from the phone …
SIEM doesn’t reduce security incidents, say IT pros
A survey of IT professional has shown that most organisations don’t audit their IT infrastructures and those that do don’t have complete details of who changed …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation