NSA legally forces Verizon to hand over all phone records on a daily basis
An order issued by the secret Foreign Intelligence Surveillance Court (FISC) that compels Verizon to share metadata on all the phone calls its users make with the NSA has been …
Fake Mt. Gox pages aim to infect Bitcoin users
Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …
Microsoft and FBI disrupt global cybercrime ring
Microsoft, the FBI, Agari, financial services industry leaders FS-ISAC, NACHA, and other industry partners, managed to break up a massive cybercrime ring which was stealing …
Most small businesses can’t restore all data after a cyber attack
Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …
Google researcher publishes Windows 0-day exploit
Less than two weeks after Google researcher Tavis Ormandy released information about a new Windows zero-day vulnerability on the Full Disclosure mailing list and asked for …
Is data fragmentation putting businesses at risk?
IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging “Shadow IT’ network of user devices or consumer cloud …
Cloud security for Windows, Android and iOS
Boxcryptor, the cloud-optimized encryption software, has been updated to version 2.0. The new version includes increased usability as well as features for secure …
Windows 8.1 will allow locking folders with a finger
Windows 8.1 is scheduled to be released at the end of 2013, and among the various changes that Microsoft aims to implement in it is native support for fingerprint readers, so …
The need for a collaborative effort against cybercrime
It has been revealed that NATO experienced 2,500 cyber attacks in 2012. Though an official stated that none of the attacks had successfully infiltrated NATO security, it has …
Most businesses experienced a mobile security incident
79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, according to Check Point. The report found mobile security …
Internet-savvy Turkish protesters turn to anti-censorship apps
In the months leading up to the current protests in Turkey, its government has been censoring content on Twitter and Facebook, as well as throttling and blocking access to …
Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement
A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …
Featured news
Resources
Don't miss
- PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
- Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
- Managing legacy medical devices that can no longer be patched
- Chain of security weaknesses found in smart air compressor model
- Review: The Wireless Cookbook