Top 12 scams of the holiday season
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …
GCHQ hacks GRX providers to mount MitM attacks on smartphone users
A new report by German Der Spiegel has revealed that the Government Communications Headquarters (GCHQ), the UK equivalent of the US NSA, has compromised a number of Global …
New IE 0-day actively exploited by Chinese attackers
After having discovered a new IE zero-day exploit being actively used in the wild, FireEye researchers have revealed that the watering hole attack is more than likely mounted …
Trustwave acquires Application Security, Inc.
Trustwave announced the acquisition of data security provider Application Security, Inc. The company’s automated database security scanning technologies strengthen …
Snowden social-engineered co-workers to share their passwords
The revelations stemming from the documents exfiltrated by former NSA contractor Edward Snowden have changed the way we look at many things, but the details that have been …
Over 30 billion devices will be connected in 2020
With the digital world upon us, digitalization will significantly change the technology market through the Internet of Things, according to Gartner. While IT spending in …
Cryptolocker surge directly tied with Blackhole downfall
The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …
The complexity of Android malware is increasing
259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …
Malware analysts regularly investigate undisclosed data breaches
ThreatTrack Security published a study that reveals mounting cybersecurity challenges within U.S. enterprises. Nearly 6 in 10 malware analysts reported they have investigated …
Week in review: TrueCrypt’s public security audit, new MS 0-day exploited, new bug bounty programs
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: ENISA issues recommendations for securing data using cryptography …
Inkblots could solve problem of compromised passwords
Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often …
Bitcoin wallet service hacked, 4,100 Bitcoins stolen
A daring hack and heist targeting online Bitcoin wallet service Inputs.io has resulted in the theft of 4,100 Bitcoins (currently over $1.3 million) and has left some of the …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation