Twitter follower scams tricked thousands to gain followers
A series of enhanced follower scams have tricked thousands of Twitter users after a group abused the platform’s authentication system, its Trends section and TweetDeck. …
Most comment spam traffic is generated by 28% of attackers
Imperva released its June Hacker Intelligence Initiative report, which presents an in-depth study of how a relatively small number of attack sources are responsible for the …
Some governments have direct access to Vodafone networks
Telecommunications giant Vodafone has released its first-ever Law Enforcement Disclosure Report, and among the things revealed in it is the scary fact that some countries have …
German startup raises $2M for NSA-proof server
A German startup has broken crowdfunding records as it managed to get pledges for 1.5 million Euros (around $2 million) in less than a few hours. The project that prompted …
Breakdown of traditional security models and strategies
Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …
Week in review: Defeating UEFI’s SecureBoot, Gameover Zeus botnet disrupted, first Android file-encrypting Trojan
Here’s an overview of some of last week’s most interesting news, interviews, podcasts and articles: International action against Gameover Zeus botnet and …
Five ways to avoid costly compliance risks
When it comes to violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules, the stakes can be high. Recently, the New York …
What are the legal obligations to encrypt personal data?
A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, …
UK government proposes life sentences for hackers
Hackers in the UK could be in for a world of problems, as the UK government is looking to hand out life-long prison sentences to those who are found guilty of organizing and …
Big Data needs a data-centric security focus
CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …
Identify stolen credentials to improve security intelligence
Data is the heart of an organization, and IT security teams are its protectors. Businesses spend billions of dollars per year setting up fortresses to safeguard data from …
Most people have done nothing to protect their privacy
Over 260 million people have been victims of data breaches and increased risk of identity theft since the Target revelations, yet nearly 80 percent have done nothing to …
Featured news
Resources
Don't miss
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info