Experts highlight top data breach vulnerabilities
Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …
Why BYOx is the next big concern of CISOs
Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …
Free tool repairs critical Windows configuration vulnerabilities
Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …
IT pros focus on cloud security, not hype
Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …
Blue Coat to acquire Solera Networks
Blue Coat Systems has entered into an agreement to acquire Solera Networks, a provider of big data security intelligence and analytics for threat protection. The Solera …
APT1 is back, attacks many of the initial U.S. corporate targets
The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …
US DOJ accuses journalist of espionage
Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …
A closer look at Mega cloud storage
Once a novelty, nowadays many cloud storage services are fighting for their piece of the market in the virtual world. Today I’m taking a look at Mega, a service that …
Aurora attackers were looking for Google’s surveillance database
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …
“NATO vacancies” phishing email also leads to malware
An interesting and very comprehensive phishing and malware-delivery campaign has been spotted by Webroot researchers. The attackers are posing as the chief of NATO’s …
CISOs need to engage with the board
Cyberspace has placed information risk firmly on the boardroom agenda, and CISOs need to engage with their boards to ensure their organizations understand and manage …
Find TrueCrypt and BitLocker encrypted containers and images
Passware announced that Passware Kit Forensic 12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, during a computer scan. For a computer …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it