One in ten consumers lost money to online fraud
More than one in ten consumers globally have been victims of online fraud that cost them money, according to a recent F-Secure survey which fleshed out consumer concerns about …
Tips for educational organizations on how to defend against online threats
The kids are back to school and hopefully they’re heeding the right advice on how to stay safe in an educational environment, but students aren’t the only ones who …
Video: NSA hearing in the European Parliament
Embedded below is the full video of the NSA hearing in the Human Rights Committee (LIBE) in the European Parliament 5 September 2013, which runs at 03:25 hours. Courtesy of …
Zscaler cloud-based platform makes behavioral analysis mainstream
Zscaler announced Zscaler for APTs, a cloud-based security solution to address the entire advanced persistent threat (APT) and advanced targeted attack (ATA) defense …
Evaluate the skill level of Linux pros
TrueAbility launched AbilityScreen for Linux Professionals, a new way to evaluate the skill level of those who work within a Linux environment. Individuals now have a way to …
Largest Belgian telecom breached by the NSA?
Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an …
FBI confirms they were behind Freedom Hosting’s takeover
An FBI agent testifying at the court hearing where the subject of bail for Freedom Hosting owner Eric Eoin Marques was discussed has confirmed that the FBI has, indeed, had a …
NSA impersonated Google in MitM attacks
After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British …
Fake “new voicemail” notification targets Android WhatsApp users
Malware peddlers have decided to bank on the popularity of the WhatsApp cross-platform IM app for smartphones in order to get users to install malicious apps on their devices, …
Proof-based system to secure the car
The digital systems in today’s connected car, including engine, infotainment and telematics systems, provide communications, numerous conveniences, information, safety, …
Free eBook: First Aid Kit for Sys Admins
Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which …
Secure mobility assessment tool
Mobile Work Exchange, a public-private partnership focused on demonstrating the value of mobility and telework, launched the Secure Mobility Hot Zone, which includes a …
Featured news
Resources
Don't miss
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits
- Weak enforcement keeps PCI DSS compliance low
- Formal proofs expose long standing cracks in DNSSEC
- WatchGuard Firebox firewalls under attack (CVE-2025-14733)
- Docker makes hardened images free open and transparent for everyone