Backdoor Trojan picks up commands from Evernote account
Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …
Global credit card fraud network dismantled
44 members of a global credit card fraud network have been arrested in a joint operation coordinated by the Romanian Cybercrime Unit in Romania, in close cooperation with …
A look at how consumers safeguard their devices
While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …
Ideas for deterring cyber espionage attacks
There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and beyond
The Computer Fraud and Abuse Act is controversial for its broad reach and potential for misuse. In this video from Shmoocon 2013, Professor Orin Kerr and Marcia Hofmann from …
Spam filters are blocking less spam
Virus Bulletin announced the results of its latest anti-spam comparative review: 17 solutions achieved a VBSpam award, but the majority did so with a lower spam catch rate …
TypeWATCH: Advanced persistent e-biometrics
Watchful Software released TypeWATCH 1.2, an e-biometrics solution that leverages the science of Keystroke Dynamics to identify and authenticate users simply by the way they …
Wi-Fi sensors for remote monitoring
Monnit released a new line of Wi-Fi sensors, known as MoWi. These sensors use an integrated, 2.4GHz – 802.11b/g, FCC/CE certified radio transmitter. This allows them to …
Massive DDoS attack targets Spamhaus
The DDoS attacks mounted against Spamhaus over a week ago have escalated in the last few days, reaching a never previously experienced level of some 300 gigabits per second at …
Researcher sets up honeypot to counterattack, identifies attackers
I believe that most infosec professionals have, at one time or other, wished they could fight back when some of the resources they are tasked with protecting came under attack …
Thousands of Amazon S3 buckets left open exposing private data
Cloud hosting and cloud storage is all the rage, but there are still some common pitfalls that many organizations overlook. In this article I will walk through an issue that …
Top April Fools’ Day hoaxes throughout history
April Fools’ Day is a time for practical jokes, hoaxes and laughs. However, it’s important to understand that April Fools’ Day is also an ample opportunity …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?