Microsoft’s quest to make users drop Windows XP continues
As the date of the scheduled retirement of Windows XP – arguably one of Microsoft’s most popular products ever – draws near, the company continues its quest …
Major gaps found in the governance of emerging technologies
SailPoint published an infographic which outlines recent research results that indicate that while global enterprises are embracing – and in some instances mandating …
GnuTLS library flaw opens way for MitM attacks
A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …
New Android devices sold with pre-installed malware
A wide range of smartphones and tablets manufactured by Samsung, Motorola, Asus and LG Electronics have apparently been compromised with malicious apps before being sold to …
Cryptocat now available for iPhone
Cryptocat, the popular open source application that enables users to chat online easily and securely, is now available for iPhone users (on Apple’s App Store), as well. …
73% of companies are unprepared for disaster recovery
The Disaster Recovery Preparedness (DRP) Council announced findings from its benchmark study which show that 73% of respondent organizations worldwide are not taking adequate …
More Bitcoin thefts, Bitcoin bank Flexcoin shuts down
Mere days after Mt. Gox filed for bankruptcy, “Bitcoin bank” Flexcoin and Bitcoin exchange Poloniex have announced that they have been successfully targeted by …
Three-year-old Uroburos rootkit likely created by Russian state-sponsored hackers
Researchers from German antivirus company G Data have discovered and analyzed a complex rootkit with spying capabilities and believe that it has been created and employed by …
300,000 routers compromised in DNS hijacking campaign
Some 300,000 confirmed – but most likely many more – small office/home office (SOHO) routers have been compromised and their DNS settings changed to use two IP …
Four trillion security transactions reveal security highlights
In 2013, CYREN analyzed more than four trillion security transactions worldwide – averaging 10 to 15 billion transactions per day. There’s been a marked increase …
Zeus retrieves attack list hidden in sunset and cat images
Malware peddlers employing a new Zeus banking Trojan variant have resorted to hiding the malware’s configuration file into innocuous-looking sunset and cat photos, warns …
Scammers turn to Facebook for targeting
Scammers are increasingly taking advantage of Facebook targeting tools and user trust to push cheap pharmaceuticals, designer replicas and other products in a trend …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade