App turns a mobile device into a personal authenticator
Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …
New USB flash drives from SanDisk
SanDisk announced three USB flash drives, the SanDisk Ultra USB 3.0, Cruzer Orbit and Cruzer Force USB flash drives. All three drives are ideal for secure storage, allowing …
Microsoft patches 34 vulnerabilities
We have seven bulletins from Microsoft this month, addressing a total of 34 vulnerabilities. Six of the bulletins are rated “critical” and allow for Remote Code …
Latest leaks by NSA whistleblower reveal NSA’s global reach
EU countries might be formally outraged at the US bugging of EU officials both in America and Europe and NSA’s phone surveillance in general, but as news outlets …
EPIC petitions US Supreme court to stop NSA domestic phone spying
The Washington-based Electronic Privacy Information Center (EPIC) has filed on Monday a petition with the US Supreme Court asking it to put a stop to the disclosure of the …
Identity and access management tips for proactive compliance
N8 Identity announced eight tips for proactive compliance through identity and access management (IAM) best practices. These tips offer advice to organizations seeking to …
Equifax acquires TrustedID
Equifax has acquired TrustedID, which will become part of Equifax Personal Solutions, Equifax’s direct-to-consumer business unit offering credit monitoring and identity …
POC code for critical Android bug published
Last week, researchers from Bluebox Security have made a disconcerting revelation: Google’s Android mobile OS carries a critical bug that allows attackers to modify the …
Privacy policy changes allow AT&T to sell user data
AT&T, the largest provider of mobile telephony in the United States, has recently announced several changes in their Privacy Policy to allow the sale of anonymized user …
“Google account hacked” text scam puzzles researchers
A curious spamming campaign continues to target Google users via their mobile phones, and researchers still don’t know what it actually does. First spotted back in …
Audit privileged access to Microsoft Online Services
Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …
US Emergency Alerting System vulnerable to attack
IOActive has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States. They uncovered the …
Featured news
Resources
Don't miss
- Fully patched FortiGate firewalls are getting compromised via CVE-2025-59718?
- RCE flaw in Cisco enterprise communications products probed by attackers (CVE-2026-20045)
- RansomHub claims alleged breach of Apple partner Luxshare
- Linux users targeted by crypto thieves via hijacked apps on Snap Store
- Pro-Russian hacktivist campaigns continue against UK organizations