Brazil determined to stop NSA spying
Perhaps no country in the world has been as vocal about doing something about NSA’s global Internet surveillance reach as Brazil. As one of the fastest-growing major …
Vulnerable and aggressive adware threatening millions
FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party …
Video: How the grid will be hacked
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the …
GnuPG 2.0.22 fixes security problem
GnuPG 2.0.22 is a security fix release and all users are advised to updated to this version. What’s new: Fixed possible infinite recursion in the compressed packet …
Enterprise tech projects increasingly funded by business, not IT
According to a new IDC survey of 1,200 line of business executives, 61% of enterprise technology projects are now funded by the business rather than the IT department, and IT …
Emulex releases appliance for cloud, security and mobile deployments
Emulex announced the new EndaceFlow 3040 NetFlow generator appliance, which is purpose-built for use with high-density 10GbE networks, generates 100 percent accurate NetFlows …
Week in review: Adobe breach, Silk Road takedown, and the future of information security
Here’s an overview of some of last week’s most interesting news, videos, interviews and articles: The impact of false positives on web application security …
Reactions from the security community to the Adobe breach
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Microsoft to unveil eight bulletins on Tuesday
October is turning out to be a busy month for patches. Next week is Patch Tuesday, and both Adobe and Microsoft have published their advance notices, with one and eight …
Shell Control Box now monitors web based applications
BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance. The latest version of SCB makes forensics investigations easier, …
Video: Practical exploitation using a malicious SSID
In this video from DerbyCon, Deral Heiland discusses the leveraging of SSIDs to inject various attacks into wireless devices, and management consoles. The type of injection …
Adobe breached, customer info and source code compromised
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground