Data broker databases breached, stolen info used by ID theft service
Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …
Yahoo ID recycling scheme is potential security minefield
Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …
Employees keep using personal cloud services to store work documents
Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of …
Java exploits jump, Android malware emerges outside app stores
A continued rise in exploit-based attacks, particularly against Java, and an increasing sophistication in mobile threats characterized the first half of 2013, which saw its …
Free Wi-Fi, but at what cost?
An investigation into public Wi-Fi has found that 51% of free Wi-Fi hotspots in the UK allow access to content of an adult nature. AdaptiveMobile examined Wi-Fi filtering …
Budget and job trend data for CISOs
Wisegate released its IT Security Benchmark Report, based on a survey developed by Wisegate Members, who are senior CISOs and security practitioners, to answer the questions …
Phishing and malicious attachments on the increase
Spam volume has dropped in August, but with the level of phishing increasing tenfold and malicious attachments being found in 3.4 percent more emails when compared with July, …
MEPs raise suspension of EU-US bank data deal
MEPs raised the possibility of suspending or even terminating the EU-US Terrorist Finance Tracking Programme (TFTP), during the discussion on Tuesday about the NSA’s …
Attackers sharpen skills: What that really means for CISOs
Today, IBM is revealing the results of its X-Force 2013 Mid-Year Trend and Risk Report, which shows that Chief Information Security Officers (CISOs) must increase their …
Survey highlights ignorant IT behavior in the workplace
You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …
Unofficial Android iMessage app can steal info and download malware
Android users who have dreamed about being able to use iMessage, Apple’s proprietary and free messaging solution, have been pleasantly surprised by the iMessage Chat for …
Major increase in Filecoder malware
The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware – Trojans that encrypt user files and try to extort a ransom from the …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)