Internet Explorer best at malware and privacy protection
Back in May, NSS Labs shared the results of their testing of how successful popular Web browsers are in detecting malware, showing that the latest versions of Internet …
Snowden free to leave Moscow airport
Edward Snowden, the NSA whistleblower who has been stuck in the transit zone of the Moscow Sheremetyevo International Airport for the last month, has finally been given …
Ponzi scheme involving Bitcoin exposed
The Securities and Exchange Commission charged man and his company with defrauding investors in a Ponzi scheme involving Bitcoin, a virtual currency traded on online exchanges …
Bogus AmEx notification leads to thorough phishing
American Express-themed phishing emails are never out of circulation, but it pays to know which new (or recycled) angle is being used at the moment. The latest one to hit …
Bogus “Royal Baby: Live Updates” email leads to malware
As expected, news of the new birth in the British Royal Family has become a perfect lure in malware delivery schemes. ThreatTrack has spotted an email titled “The Royal …
Lessons learnt from the Lakeland attack
Last Friday, the British Kitchenware store, Lakeland, suffered a major data breach that involved two encrypted databases. To make things worse, the company doesn’t know …
E-commerce fraud prevention service from Trusteer
Trusteer announced its Cybercrime Prevention Architecture for e-commerce, which provides “bank grade” security to retailers, social media, dating, gaming and other …
72% can’t securely manage multiple computing environments
AppSense and CTOVision announced the results of a survey that included responses from 245 executives, technologists and contractors – across the defense, intelligence …
Increase in malicious DNS request traffic
With regard to the OpUSA hacktivist campaign, Solutionary discovered that attackers responsible for previous DDoS attacks on the financial sector leveraged a variety of …
SailPoint unveils IAM-as-a-Service suite
SailPoint announced IdentityNow, an IAM-as-a-service (IDaaS) that delivers enterprise-grade identity governance, provisioning and access management in a single, unified …
SIM encryption flaw opens 500M users to attack
A flaw in the encryption technology used by some SIM cards can allow attackers to make the target phone download malicious apps and even effectively clone a user’s card …
Syrian hackers hit Tango, The Daily Dot
Pro-Assad hacker group the Syrian Electronic Army claims to have breached the back-up database of Tango, the company behind the popular eponymous app, and to have exfiltrated …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits