Facebook scam promises naked videos of friends, delivers Trojans instead
Bitdefender has discovered that more than 1,000 people have already been tricked into installing Trojan malware after clicking on a new Facebook scam that promises naked …
Techniques used in high-profile data breaches
McAfee Labs released a new report, highlighting the role of the “dark web” malware industry as a key enabler of the high-profile POS attacks and data breaches in …
Week in review: Critical GnuTLS library flaw, and new Android devices sold with pre-installed malware
Here’s an overview of some of last week’s most interesting news, videos, and podcasts: Mt. Gox users targeted with fake promises of lost Bitcoin recovery Bitcoin …
Personal info of 12 million KT customers stolen and misused
Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial information of some 12 million customers of …
Dendroid spying RAT malware found on Google Play
A new Android malware toolkit called Dendroid is being offered for sale by its creators, and at least one of the malicious APKs created with it has managed to fool Google …
Siesta cyber espionage campaign targets many industries
Trend Micro researchers have uncovered yet another cyber espionage campaign targeting a wide variety of industries including energy, finance, security and defense, and …
Using free Wi-Fi in Europe is risky
Internet users would do well to be extra careful when attempting to use public Wi-Fi hotspots in Europe, as hackers and cyber crooks have lately ramped up their efforts to …
SolarWinds enhances its Network Performance Monitor
SolarWinds announced further enhancements to SolarWinds Network Performance Monitor (NPM) that offer the robust network performance monitoring, alerting and reporting …
Upcoming Patch Tuesday looks small once again
Microsoft’s March Patch Tuesday is again shaping up to be on the lighter side of some months, continuing the 2014 trend of smaller Patch Tuesdays. We only see 2 issues …
European IT pros reveal top reasons to monitor privileged users
BalaBit IT Security announced results of a recent survey of IT security professionals about use of privileged identity management (PIM) and privileged activity monitoring …
HTTPS can’t be trusted to obscure private online activity
HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …
Cybercriminals increasingly drawn to Tor anonymity and hidden services
Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity