Belgacom shares more details about alleged GCHQ breach
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
The chip and PIN payment card system – or EMV – is considered to be more secure than the magnetic strip one, but it’s also not bulletproof. Nevertheless, US …
246 percent spike in Apple-themed phishing scams
Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …
Top 10 cloud myths
Cloud computing is uniquely susceptible to the perils of myths due to the nature, confusion and hype surrounding it, according to Gartner, Inc. These myths slow things down, …
Cyber security coalition reports on Chinese state-sponsored espionage
Novetta Solutions released multiple reports, the main one being titled “Operation SMN: Axiom Threat Actor Group Report”, which details the characteristics of a …
IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds
IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate …
APWG launches global cybercrime reporting program
The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime …
Code Red: A global initiative for fighting government surveillance
Well known and widely respected privacy expert and advocate Simon Davies has announced the creation of a new global initiative that’s aimed at supporting the world-wide …
RBS WorldPay hack ringleader finally sentenced
Nearly five years after the day he was indicted, Sergei Nicolaevich Tsurikov has finally been sentenced for conspiracy to commit wire fraud and computer intrusion for his …
Tor exit node found patching downloaded binaries with malware
A researcher has spotted a Tor exit node located in Russia which instead of delivering the software requested by users untouched, was adding malicious code to the binaries in …
Most IT sec pros still rely on perimeter security to stop APTs
78 percent of IT security professionals are confident that firewalls and antimalware tools are robust enough to combat today’s advanced persistent threats, say the …
Mobile carriers fined $10M for making private user info accessible via Google search
The FCC intends to fine TerraCom, Inc. and YourTel America, Inc. $10 million for several violations of laws protecting the privacy of phone customers’ personal …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation