Tor users targeted with spyware following anonymous Web-host shutdown
The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …
Working as an ethical hacker
The term “ethical hacker” as it is used today is, if you ask me, somewhat imprecise. After all, a hacker in it for the money could be said to follow his or her own …
Free ebook: Introducing Windows Server 2012 R2 Preview Release
Microsoft released a free ebook by Mitch Tulloch with the Windows Server Team. Introducing Windows Server 2012 R2 Preview Release introduces new features and capabilities, …
Cybercriminals are doing a better job than the companies they target
What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney’s Office in NJ unsealed their …
Russians responsible for 30% of mobile malware
Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …
Collaborative threat intelligence platform from ThreatConnect
ThreatConnect launched the ThreatConnect Platform, a combination of analytical tools that assist in finding and analyzing threat indicators and community-based sharing …
Week in review: iPhone charger, PLC, femtocells hacks, and the future of phishing
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: To achieve good security, you need to focus on business In September …
FBI uses malware to spy on suspects via their phones
The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …
Engineers demonstrate PLC hack on mock oil rig
The widely known Stuxnet incident made sure that the mere mention of SCADA vulnerabilities is enough for security experts to pause. After all, sabotaging industrial control …
FBI announces cyberattack-reporting portal for private sector companies
The US FBI has launched iGuardian, an online portal for private sector companies that allows them to easily and consistently report to the Bureau any cyber threat or attack …
ZeroAcces rootkit dominates, adds new persistence techniques
According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …
CISO spending priorities revealed
According to a GDS International survey of more than 100 leading European information security professionals, investment priorities are changing. Spending to support business …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)