Hacker hijacks Apple devices remotely, asks for ransom
An unusual case of cyber extortion has been spotted in Australia: Apple device users in Queensland, NSW, Western Australia, South Australia and Victoria have woken up to see …
Instant messaging Trojan spreads through the UK
Hundreds of computer systems have been infected with the latest instant messaging Trojan. Bitdefender has spotted an increasing wave of infections in the past week in …
Operation takes down crime network affecting European electronic payments
Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Europol and Eurojust in The Hague, …
In wake of breach, eBay has to deal with multiple web vulnerabilities
As eBay flounders while trying to adequately respond to the breach it disclosed last week, and deems weak passwords to be good but stronger ones to be weak, researchers are …
Week in review: eBay breach, Linux Trojans, US charges Chinese military hackers for spying on US firms
Here’s an overview of some of last week’s most interesting news, podcasts, and articles: Record month for Linux Trojans If you think that you are protected from …
China will start screening IT products
The Chinese government has announced that it will start vetting IT products and services that are to be used on networks and systems important to national security and public …
Anti-surveillance mask foils facial recognition systems
The unnerving ubiquity of security cameras in public places and the fact that an increasing number of them are connected to facial recognition systems has spurred …
Google Image Search results redirect to Browlock ransomware
Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …
Facebook introduces privacy check up tool
Facebook continues on its course to give users more privacy by making “Friends” the default sharing option for first time posters, and by introducing a privacy …
Netwrix extends auditing visibility into SharePoint changes
SharePoint has become a popular business application for storing data, sharing content and powering websites. For many organizations, it is the core of their collaboration …
What is the key to IT program management?
The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. …
Trust in the U.S. cloud on the decline
Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation