Collected data helped foil 50 terrorist plots, says NSA chief
A number of top government officials have been called to testify at a congressional hearing before U.S. Senate Select Committee on Intelligence on the topic of NSA …
65+ websites compromised to deliver malvertising
At least 65 different sites serving ads that ultimately led to malware have been spotted by Zscaler researchers. The massive malvertising campaign started with injected code …
Thwarting facial recognition systems with privacy visors
Despite Google announcement that it won’t allow facial recognition on Google Glass (yet) and Facebook turning it off (just in Europe), every person should be aware that …
Customized spam uses cell phone users’ data against them
US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile. For the first time, mobile …
Employees biggest IT threat to businesses
Despite British small and medium sized enterprises (SMEs) providing training in IT and security, employees fail to prevent breaches and data leaks, according to McAfee. Even …
Facebook once again accessible via Tor
For several hours on Tuesday, regular Tor users have been taken aback by the fact that Facebook was blocking connections from the Tor network. The Onion Router allows users to …
(IN)SECURE Magazine issue 38 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …
Google asks secret court permission to publish FISA numbers
Google’s open letter to U.S. Attorney General Holder and the Federal Bureau of Investigation chief Muller last week obviously produced some results, but the company in …
Failed backups endanger revenue and productivity
SMBs are losing critical business information as a result of failed backups, and have suffered significant impacts as a result, according to GFI Software. Many IT …
Oracle releases critical security updates for Java
Oracle released 40 new Java security fixes. 37 of the vulnerabilities may be remotely exploitable without authentication. This was described as the possibility of being …
How to detect hidden administrator apps on Android
Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …
CyanogenMod founder aims to thwart data-grabbing apps
There’s some very good news for users of CyanogenMod, one of the most popular modified Android firmware on the market: its founder and main developer Steve Kondik (aka …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation