“Your private naked photos online” emails lead to total computer compromise
Malware peddlers continue to use the old “your naked photos online” lure to trick users into following malicious links or downloading malicious attachments, warns …
Bitdefender launches Antivirus Free for Android
Bitdefender has launched Antivirus Free for Android, which offers smartphone owners a free, fast and powerful antivirus solution that taps the latest in-the-cloud scanning …
Twitter wisdom: April 9, 2013
Here’s food for thought from people you should be following on Twitter. Actually it strikes me dentistry and infosec are similar. We both breach prevention better than …
The cloud: Storms on the horizon
At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …
New HP server for social, cloud and big data
HP unveiled the HP Moonshot system, delivering new infrastructure economics by using up to 89 percent less energy, 80 percent less space and costing 77 percent less, compared …
Bitcoin-mining Trojan lurking on Skype
Bitcoin-mining malware is nothing new, but with the success of Bitcoin and the renewed interest it is receiving lately, cyber crooks are again concentrating their efforts to …
Anonymous and affiliates attack Israeli websites
As announced, hacker groups affiliated with Anonymous have joined in the attacks on Israeli web properties. By launching “Operation Israel”, the hacktivist …
Spear-phishing emails targeting energy companies
Information over-sharing can lead to cleverly executed and dangerous spear-phishing campaigns, warns the US Department of Homeland Security and the ICS-CERT. According to an …
WordPress.com adds 2-factor authentication option
WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users. To set it …
New Splunk App for Windows
Splunk announced Splunk App for Windows 5.0 , which delivers enterprise-class monitoring for Microsoft Windows Server. It enables users to monitor their end-to-end …
Generalized single packet authorization for cloud computing environments
Cloud computing environments such as those provided by Amazon and Google can be your passport to powerful computing resources without having to worry about typical …
The rise of everyday hackers
Veracode released its annual State of Software Security Report, which includes research on software vulnerability trends as well as predictions on how these flaws could be …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it