NSA sysadmins to be replaced with computers
NSA director and commander of US Cyber Command General Keith Alexander has announced that the intelligence agency is planning to drastically scale down the number of its …
More apps exploiting Android “Master Key” bug found
Patches for the two recently discovered Android “Master Key” bugs are still to be pushed out by many mobile carriers and device manufacturers. In the meantime, …
Beware of bogus Facebook account hack tool offer
If, for whatever reason, you wish to hack into someone else’s Facebook account, searching online for ways to do it will likely bring you grief. Take for example a …
Secure mail providers close up shop to prevent govt spying
Texas-based secure webmail service Lavabit has unexpectedly closed up shop on Thursday, and the explanation given by owner and operator Ladar Levison is as follows: I have …
Netwrix updates its configuration auditing software
Netwrix Corporation announced Netwrix Auditor 5.0, a configuration auditing solution for security, compliance and operations across the entire IT infrastructure. It provides …
Microsoft to release three critical fixes
The August 2013 Patch Tuesday advance notification includes a slightly higher volume of fixes than last month, but only 3 of 8 are critical, which is down from July’s 6 …
Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Facebook rolls out Graph Search for English speaking users
Graph Search, the semantic search engine whose Beta version Facebook introduced in March 2013, has been made available for everybody who uses the US English language. The …
Linux banking Trojan offered for sale
Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …
Chrome not the only browser that stores plain-text passwords
When choosing to import his Safari bookmarks and settings into Google’s Chrome browser, software developer Elliot Kember discovered that although it seemed like he could …
Security intelligence through configuration auditing
Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems …
Compliance no longer main driver of security measures
The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way