Top enterprise security threats identified
A new report from HP provides in-depth data and analysis around the most pressing security issues plaguing enterprises. It details factors that contributed most to the growing …
Hotel management firm breached, card details of guests stolen
Hotel management firm White Lodging seems to have had its systems compromised and the attackers managed to exfiltrate a yet unknown quantity of credit and debit card details. …
Pwn2Own 2014: $150,000 for an “exploit unicorn”
There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …
Security breaches, data loss and outages cost U.S. hospitals $1.6B
A new MeriTalk report, based on a survey of healthcare IT executives and underwritten by EMC, quantifies the organizational cost associated with security breaches, data loss, …
A solution for fixing hijacked Chrome settings
Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …
How a fake antivirus attack works
Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …
Dell releases secure, managed, ultra-mobile cloud access device
Dell announced Dell Wyse Cloud Connect, an ultra-compact and highly mobile cloud-access device that delivers desktop virtualization and personal cloud services to any HDMI- or …
Hackers breach Bell Canada, leak customer info and passwords
The hacker group NullCrew has managed to access servers belonging to Bell Canada – or a third-party supplier, as Bell claims – and steal and ultimately leak …
Week in review: Feds clone TorMail server, first Android bootkit, SpyEye creator pleads guilty
Here’s an overview of some of last week’s most interesting news, interviews, articles and reviews: Which e-commerce sites do more to protect your password? A …
PoC mobile malware records swipes on touch screen smartphones
A security researcher has developed proof-of-concept malware capable of capturing screenshots and finger swipes on mobile devices, and is set to demonstrate his creation at …
Canadian spy agency used free airport WiFi to track travelers
A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …
Reactions to the Yahoo Mail hack
Unknown attackers have attempted to access a number of Yahoo Mail accounts and urged users to change their passwords even if they haven’t been affected. Here are some of …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity