Tips for educational organizations on how to defend against online threats
The kids are back to school and hopefully they’re heeding the right advice on how to stay safe in an educational environment, but students aren’t the only ones who …
Video: NSA hearing in the European Parliament
Embedded below is the full video of the NSA hearing in the Human Rights Committee (LIBE) in the European Parliament 5 September 2013, which runs at 03:25 hours. Courtesy of …
Zscaler cloud-based platform makes behavioral analysis mainstream
Zscaler announced Zscaler for APTs, a cloud-based security solution to address the entire advanced persistent threat (APT) and advanced targeted attack (ATA) defense …
Evaluate the skill level of Linux pros
TrueAbility launched AbilityScreen for Linux Professionals, a new way to evaluate the skill level of those who work within a Linux environment. Individuals now have a way to …
Largest Belgian telecom breached by the NSA?
Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an …
FBI confirms they were behind Freedom Hosting’s takeover
An FBI agent testifying at the court hearing where the subject of bail for Freedom Hosting owner Eric Eoin Marques was discussed has confirmed that the FBI has, indeed, had a …
NSA impersonated Google in MitM attacks
After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British …
Fake “new voicemail” notification targets Android WhatsApp users
Malware peddlers have decided to bank on the popularity of the WhatsApp cross-platform IM app for smartphones in order to get users to install malicious apps on their devices, …
Proof-based system to secure the car
The digital systems in today’s connected car, including engine, infotainment and telematics systems, provide communications, numerous conveniences, information, safety, …
Free eBook: First Aid Kit for Sys Admins
Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which …
Secure mobility assessment tool
Mobile Work Exchange, a public-private partnership focused on demonstrating the value of mobility and telework, launched the Secure Mobility Hot Zone, which includes a …
SolarWinds Server & Application Monitor 6.0 released
SolarWinds released SolarWinds Server & Application Monitor (SAM) 6.0, designed to deliver agentless performance and availability monitoring, alerting and reporting for …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)