Week in review: Reactions to PRISM, and the question of whether or not to hack back
Here’s an overview of some of last week’s most interesting news, articles and reviews: The future of online authentication Recently, Twitter has introduced …
Japan aims to monitor Internet-based communications
After having agreed on a draft of an official cybersecurity strategy earlier this month, Japan’s National Information Security Center (NISC) is looking to establish a …
Asia-wide targeted campaign drops backdoor, RAT
A new and widespread phishing campaign has been discovered targeting businesses and government institutions across Asia, Trend Micro reports. Telecoms, oil and gas companies, …
Automated analysis of essential security controls
EiQ Networks announced ThreatVue, an out-of-the-box security monitoring solution that automates the implementation, analysis and remediation guidance of essential security …
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
ISC-CERT warns about medical devices with hard-coded passwords
Approximately 300 different surgical and anesthesia devices, ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment …
Large orgs in denial about own security breaches?
Over two thirds (66%) of large organizations said they either had not experienced a security incident in the last 12-18 months or were unsure if they had, a recent Lancope …
Americans were anxious about privacy even before NSA spying scandal
Big Brother is watching and Americans know it. New figures from the quarterly Allstate/National Journal Heartland Monitor Poll show that most Americans exhibit a healthy …
Why does the public now listen to an U.S. government whistleblower?
This is not the first time that a government whistleblower has come forward and tried to warn the U.S. public about the surveillance overreach of government agencies, but it …
Google warns Iranian users of politically-motivated phishing
A massive phishing campaign believed to be motivated by the upcoming Iranian presidential election has been spotted targeting Iranian Gmail users, the company warned in a blog …
Eight charged for hacking global financial institutions
Eight alleged members of an international cybercrime, money laundering and identity theft conspiracy have been federally charged in New Jersey with a scheme to use information …
OWASP top 10 web application risks for 2013
Since 2003, application security researchers and experts from all over the world at the Open Web Application Security Project (OWASP) have carefully monitored the state of web …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it