Syrian hackers hit Tango, The Daily Dot
Pro-Assad hacker group the Syrian Electronic Army claims to have breached the back-up database of Tango, the company behind the popular eponymous app, and to have exfiltrated …
HTML ransomware goes global
Last week we saw that a ransomware scheme does not need to involve actual malware, as clever cyber crooks leveraged browsers’ “restore from crash” feature to …
Cisco to acquire Sourcefire for $2.7 billion
Cisco will acquire Sourcefire, a provider of cybersecurity solutions. The acquisition adds a team with deep security DNA to Cisco and will accelerate delivery of Cisco’s …
U.S. the number one source of web attacks
Retailers suffer twice as many SQL injection attacks as other industries, according to Imperva. Additionally, these attacks were more intense, both in terms of number of …
Ubuntu Forums hacker won’t publish stolen passwords
The Ubuntu Forums are still down following this weekend’s breach claimed by a hacker that goes by the online handle “Sputn1k_”, and there is no news on when …
Quarri delivers Protect On Q as a virtual appliance
Quarri Technologies released Quarri Protect On Q (POQ) 3.2, a virtual appliance version of its flagship web browser security solution. It also delivers high availability, …
Combat Arms players, beware of free NX generators
Players of the popular Combat Arms first-person shooter are being targeted by online crooks via the in-game chat system, warns Chris Boyd. They crooks offer what is supposedly …
Deliver real-time phishing detection from Webroot and RSA
Webroot announced a technology partnership with RSA, The Security Division of EMC, to provide real-time phishing detection to RSA FraudActionSM Anti-Phishing Service. Phishing …
Study connects cybercrime to job loss
After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and …
Children as adversaries in technologically-enhanced homes
You might sometimes consider your child an adversary when he or she prevents you from sleeping enough hours or having a sit-down meal without interruptions, but Microsoft …
Multiple Java versions on endpoints risky for enterprises
Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks, show the results of Bit9 research. The …
New ReadyNAS rackmount devices from NETGEAR
NETGEAR announced ReadyNAS 3220 and ReadyNAS 4220, the latest NAS products to run on the ReadyNAS OS, introduced in March 2013. Available in 2U rackmount form with 12-bay …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise