Largest DDoS attack ever disrupts China’s Internet
The China Internet Network Information Center (CNNIC), which maintains the registry for the .cn, China’s country code top-level domain, has notified the public that two …
Leaked info of Federal Reserve employees was stolen during earlier breach
Hacker collective Anonymous has apparently leaked a file which supposedly contains personal details of every employee of the US Federal Reserve Bank – names, job titles, …
PHDVirtual releases virtual backup and disaster recovery software
PHD Virtual Technologies announced the availability of several new products including PHD Virtual Backup 6.5, which provides methods of virtual and cloud-based data protection …
NSA spied on UN officials after cracking encryption on UN teleconferencing system
The NSA has actively spied on United Nations’ officials and personnel after managing to compromise the encryption of the organization’s internal video conferencing …
First Round of HITBSecConf Kuala Lumpur speakers announced
Here’s a taste of some presentations you can expect at HITBSecConf Malaysia in October. You can register here. Conference speakers Collin Mulliner (Researcher, Systems …
WatchGuard partners with NCP engineering for IPsec VPN access
WatchGuard announced a partnership with NCP engineering to simplify IPsec VPN access for Microsoft Windows and Apple OS X users. NCP’s remote access VPN technology is …
Week in review: Cybercrime-as-a-service, Groklaw shutdown, WIn8 unfit for govt computers
Here’s an overview of some of last week’s most interesting news, reviews and articles: Lucrative business: cybercrime-as-a-service With the rise of cloud …
CyanogenMod announces secure phone locating, remote wiping service
The CyanogenMod team has announced a new service that allows users to locate their lost phones or securely wipe their device (including the contents of the SD card) in case it …
How encryption and tokenization help with cloud services adoption
Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …
Windows 8 shouldn’t be used on government computers, say IT experts
Internal documents of the German Ministry of Economic Affairs perused by a reporter of news outlet Zeit Online show (via Google Translate) that IT professionals working for …
Popular Windows downloader has secret DDoS capability
Unbeknownst to its users and perhaps even to its developers, the popular Windows download manager Orbit Downloader has been outfitted with a DDoS component. The Orbit …
Fingerprint algorithm for Android devices
Precise Biometrics AB has launched a new software product designed and optimized for embedding fingerprint verification on smartphones and tablets. Precise BioMatch Mobile …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites