Give up on complex passwords, says Microsoft
The Internet is full of advice on how users should go about choosing strong passwords, and on what schemes web admins should implement to make them do so and what protection …
Mounting evidence points towards Home Depot breach
Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened. As Nicole Perlroth noted, the source of stolen card information can be discovered …
Network vulnerabilities IT admins can use to protect their network
Being able to adapt to change is one of the most important abilities in security today, mostly because attacks to defend against are able to do the same. The sophistication of …
Twitter launches bug bounty program
With a simple tweet, Twitter has officially launched its own bug bounty program. Set up through the security response and bug bounty platform HackerOne, the program offers a …
80% of business users are unable to detect phishing scams
McAfee Labs revealed that phishing continues to be an effective tactic for infiltrating enterprise networks. Testing business users’ ability to detect online scams, the …
Critical Security Controls adoption and implementation
A new SANS survey reports 90% of organizations taking the survey have adopted some or all of the Critical Security Controls (CSCs), and that financial and government …
9 ways to protect data on your smartphone
Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …
New Firefox offers MITM protection via public key pinning
Mozilla has released the latest version of Firefox (v32) for Windows, Mac, Linux, and Android, and the new browser sports some notable security improvements. For one, the new …
Home Depot breached, carders selling stolen payment card info
The Home Depot, a popular American home improvement and construction retailer that boasts of 2,200 stores in the US and 287 abroad, has apparently suffered a data breach that …
Linux systems infiltrated and controlled in a DDoS botnet
Akamai Technologies is alerting enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to …
iCloud wasn’t hacked, says Apple
Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …
Cybercriminals love PayPal, financial phishing on the rise
Kaspersky Lab’s experts reported a substantial increase in the amount of financial phishing in spam. There was a 7.9 percentage points increase in the amount of scam …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways