Military-grade solution to protect industrial control systems
Organisations will now be able to bring their industrial control systems technology into the modern era and realise the benefits of increased connectivity while also reducing …
NSA says illegal data collection was caused by too complex tech
NSA’s repeated claims about having its surveillance apparatus under control have taken another hit after the agency has been legally forced to publish a huge batch of …
Attacks targeting unsupported Java 6 are on the rise
As predicted at the end of 2012 and proved by the ever expanding use of exploit kits, vulnerabilities in popular and widespread software such as Java and Adobe’s Acrobat …
EU debates NSA surveillance impact and media freedom
The impact of US National Security Agency and other surveillance programs on EU citizens’ privacy and media freedom and the lack of democratic oversight of these …
2M Vodafone users’ personal and banking info compromised
The names, addresses, birth dates, and bank account information of some 2 million German Vodafone users has been compromised in a breach of a server located “deep in the …
Bogus hacking Android apps offered on Google Play
Getting your Android apps from Google Play is always a better bet than picking them up from third party online marketplaces, but you also can’t be completely sure you …
SAML 2.0 two-factor SSO without usernames or passwords
WWPass released Unified Security Manager, a virtual appliance that provides user authentication for applications that support Security Assertion Markup Language (SAML) 2.0. …
BitSight launches information security risk rating service
BitSight launched a cybersecurity offering that delivers ratings on the information security effectiveness of organizations. The ratings, which are based on externally visible …
Facebook privacy application manages who sees your posts
AVG announced its first privacy app built on the Facebook API, AVG CrowdControl. The app allows users to manage who sees their default posts for improved privacy without …
Backdoored NIST standard revealed, will be reopened for review
Following last week’s revelation that the NSA has, among other things, influenced the US National Institute of Standards and Technology (NIST) to adopt an encryption …
JollyBot SMS Trojan offered for use to low-level crooks via affiliate network
The current cybercrime market is all about Cybercrime-as-a-Service – knowledgeable individuals focus on their core competencies to offer services to those who have not …
Bogus iPhone 5C giveaway hits Facebook users
The long awaited unveiling of the upcoming iPhone 5S and 5C has provided the perfect lure for Facebook scammers. A message showing a picture of multicolored iPhones 5C and …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation