Arrests in international voice-phishing case
Belgian and Dutch judicial and law enforcement authorities, supported by the European Cybercrime Centre (EC3) at Europol and Eurojust, have concluded an operation resulting in …
NIST guidelines help developers build security in from the start
A new initiative by computer security experts at the National Institute of Standards and Technology (NIST) seeks to bring widely recognized systems and software engineering …
The evolution of an Iranian hacker group
Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …
Despite hearing about Heartbleed, 47% have not changed their passwords
In light of the recent Heartbleed bug, LifeLock announced survey results that reveal consumers’ behavior and attitudes surrounding the security flaw. The recent survey, …
Toshiba launches HDDs for surveillance applications
Toshiba launched the MD03ACA-V series, high-capacity hard disk drives for surveillance applications. Toshiba’s purpose-built line of 3.5-inch HDDs are available in …
Microsoft releases eight security updates
There is a lot going on in the updates from Microsoft this month, including some very interesting and long time coming changes. Also, it’s the highest volume of …
NSA allegedly puts backdoors on American-made network devices
Glenn Greenwald’s new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura …
Building a more secure and agile Internet
The National Science Foundation’s (NSF) Directorate for Computer and Information Science and Engineering (CISE) awarded $15 million to support three, multi-institutional …
“Your Photos Are being Used” phishing scam targeting Facebook users
Another day, another Facebook phishing scam. This one comes in the form of a warning sent by a friend: “OMG YOUR PHOTOS ARE BEING USED ON THIS SITE.” The victim, …
Making the web a safe place to visit
The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …
Researchers find, analyze forged SSL certs in the wild
A group of researchers from Carnegie Mellon University and Facebook has managed to get a concrete sense of just how prevalent SSL man-in-the-middle attacks using forged SSL …
Office workers have little trust in digital world
The majority of UK office workers have trouble deciding who to trust in the digital world, however this isn’t surprising considering 14 percent have already been badly …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)