Free shopping voucher offer leads to phishing
Cybercriminals have been ramping up their efforts as the year draws to a close, and have initiated hundreds – if not thousands – email spam campaigns, trying every …
Legitimate apps bundled up with secret Bitcoin miner
As the value of Bitcoin continues to rise, a lot of people are trying to cash in on the craze. Some do it legally, by getting their own machines to perform the calculations …
D-Link patches critical vulnerability in older routers
D-Link has released firmware patches for a number of its older routers sporting a critical authentication security bypass vulnerability discovered in October. The flaw was …
Shopping convenience overrides security concerns
Tripwire announced the results of a survey on mobile security and holiday shopping. The survey was conducted by Dimensional Research and OnePoll from November 18-20, 2013, and …
Beware of fake PayPal “Account Access Limited” phishing email
Fake PayPal emails claiming recipients will have limited access to their account because they didn’t provide enough information have been landing for the last few days …
Akamai to acquire Prolexic
Akamai and Prolexic have signed a definitive agreement for Akamai to acquire Prolexic, a provider of cloud-based security solutions for protecting data centers and enterprise …
OS X hardening tips
OS X security is evolving: defenses are improving with each OS release but the days of “Macs don’t get malware” are gone. Recent attacks against the Java Web …
Week in review: Cyber Monday dangers, Twitter adds Forward Secrecy, and a Linux worm that targets the Internet of Things
Week in review: Here’s an overview of some of last week’s most interesting news, videos and articles: Innovations that will shape network security Responding to an …
Experts predict widespread attacks on online banking users
Kaspersky Lab has recorded several thousand attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in …
Browser scan unveils an abundance of critical vulnerabilities
Through our Qualys BrowserCheck online tool we have collected data from over 1.4 million user computer scans and their respective browsers. From this research, we have found …
Can we expect a cyberwar resurgence?
Neohapsis security experts predict that next year there will be a cyberwar resurgence, the cloud will begin to show its hidden costs, and privacy will continue to lose in the …
Verify your software for security bugs
Verification is an important phase of developing secure software that is not always addressed in depth that includes dynamic analysis and fuzzing testing. This step allows …
Featured news
Resources
Don't miss
- Internet slowly recovers after far-reaching Cloudflare outage
- Google patches yet another exploited Chrome zero-day (CVE-2025-13223)
- What security pros should know about insurance coverage for AI chatbot wiretapping claims
- How attackers use patience to push past AI guardrails
- The privacy panic around machine learning is overblown