US announces transition of oversight over Internet’s domain name system
The US Commerce Department’s National Telecommunications and Information Administration (NTIA) announced its intent to transition key Internet domain name functions to …
New authenticated encryption algorithm is resistant to multiple misuse
Nippon Telegraph and Telephone Corporation, Mitsubishi Electric Corporation and the University of Fukui have jointly developed an authenticated encryption algorithm offering …
Week in review: Target breach reaction fail, WordPress sites exploited in DDoS attack
Here’s an overview of some of last week’s most interesting news, podcasts, videos, interviews and articles: Latvia establishes a Cyber Defence Unit The newly …
“Malaysian Airlines flight MH370 found” video is a scam
Cyber scammers are misusing the public’s interest in the fate of the recently disappeared plane on Malaysia Airlines flight MH370 to lure users into filling in online …
Target failed to act on malware alerts and signs of breach
The massive Target data breach could have easily been prevented if only its IT team had the good sense to thoroughly check out the alerts it received from the $1.6 million …
Tax-related identity theft will rise
Tax-related identity theft has been on the rise for years and the ITRC predicts it won’t be slowing down in 2014. The Javelin Strategy & Research 2014 Identity …
Pwn2Own 2014 ends, $850k distributed to successful hackers
Day two of the Pwn2Own hacking contest at the CanSecWest Conference in Vancouver has ended with Safari, Internet Explorer, Firefox, Chrome and Flash going down. The Vupen team …
Beware of well-executed Google Docs phishing scam
An extremely convincing phishing spam campaign is currently targeting Google Docs and Google Drive users. It all starts with an email that tells potential victims that an …
GFI WirelessSentry brings Wi-Fi management to SMBs
GFI Software unveiled GFI WirelessSentry (GFI WiSe), a cloud-based solution designed to allow IT administrators to monitor, manage and secure their wireless networks. GFI WiSe …
Backdoor in Samsung Galaxy devices discovered
The developers of Replicant, a “fully free/libre version of Android”, have discovered a backdoor in a number of Samsung Galaxy devices that could allow attackers …
Record prizes for Pwn2Own and Pwnium contestants
The results of the first day of the traditional Pwn2Own hacking contest at the CanSecWest Conference currently taking place in Vancouver are in, and the losers are Adobe, …
EC-Council discloses hack of customer email accounts
The International Council of Electronic Commerce Consultants (EC-Council), an organization that provides training and certifications for security professionals, has finally …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)