Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here’s an overview of some of last week’s most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, …
Microsoft to address six issues on Tuesday
Microsoft has dropped their July 2014 advance security notification and it looks like a relatively light month of patching. Six issues in total, 2 Critical, 3 Important, 1 …
Connecting cloud storage services and cloud-based data loss prevention
CoSoSys released a new version of My Endpoint Protector, a cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution for both Macs and PCs. The new …
Estimated $3.75bn stolen by Brazil fraud ring
An estimated $3.75 billion have been netted by a single fraud ring that took advantage of a popular Brazilian payment method – the Boleto – by wielding a …
Spammers are always thinking up new tricks
The percentage of spam in email traffic in May averaged 69.8 per cent – 1.3 percentage points less than the previous month. May saw numerous mass mailings for schools …
Microsoft supports open source software framework for IoT
The AllSeen Alliance, the broadest Internet of Everything open-source project, announced that Microsoft has joined the group’s multi-company effort as a Premier Member …
No-IP reclaims control of domains seized by Microsoft
The end of No-IP customers’ troubles seems near, as Microsoft has relinquished control of the 23 domain names it seized control of on Monday with the blessing of a …
Live open source security lab coming to Cyber Security EXPO
Cyber Security EXPO, part of IP EXPO Europe, is calling for contributors to the Cyber Hack, a live open source security lab arriving at the show this October. The Hack area …
Android HijackRAT poised to hit mobile banking users
A highly versatile piece of Android malware has been unearthed by FireEye researchers. Posing as “Google Service Framework”, the malicious app is capable of …
Exploit switches off Microsoft EMET’s protection features
By leveraging and modifying a “semi-random public exploit” researchers have managed to deactivate all protection features of the latest version of …
“Secure” UK hotel booking site leaking customer data
An infosec consultant looking to book a hotel via HotelHippo.com, owned by HotelStayUK, has ultimately discovered that the website is definitely not to be trusted with private …
Bug in WordPress plugin allows unauthorized file upload
WordPress users who also use the MailPoet plugin are urged to update it as soon as possible, as all versions but the latest one are plagued with a critical flaw that could …
Featured news
Resources
Don't miss
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way
- Prometheus: Open-source metrics and monitoring systems and services