Study connects cybercrime to job loss
After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …
Children as adversaries in technologically-enhanced homes
You might sometimes consider your child an adversary when he or she prevents you from sleeping enough hours or having a sit-down meal without interruptions, but Microsoft …
Multiple Java versions on endpoints risky for enterprises
Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …
New ReadyNAS rackmount devices from NETGEAR
NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …
Passwords of 1.8M Ubuntu Forums users compromised in hack
Ubuntuforums.org, the home of a variety of support forums dedicated to users of this popular Linux distribution, has been hacked over the weekend and defaced to show an image …
Apple developer center hacked by security researcher?
The mystery of why Apple’s Developer Center has been inaccessible for users since last Thursday has apparently been solved, as UK-based security researcher Ibrahim Balic …
Apricorn unveils FIPS 140-2 encrypted USB 3.0 drive
Apricorn debuted its Aegis Padlock Fortress, a secure drive designed specifically for the stringent requirements of the Government, Military and Healthcare. The first USB 3.0 …
BT Security CEO to keynote RSA Conference Europe 2013
RSA Conference announced BT Security CEO Mark Hughes as a keynote speaker for the 14th annual RSA Conference Europe, taking place from 29 – 31 October 2013, at Amsterdam …
Week in review: Hijacking connected cars, Android backup flaw, help desk security threats
Here’s an overview of some of last week’s most interesting news and articles: UEFI secure boot: Next generation booting or a controversial debate One of the first …
Hijacking connected cars with a $25 tool
A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …
Huawei’s Chinese connection continues to be source of suspicion
A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …
The future of electronic payment: Smartphone authentication and facial recognition
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does