Wi-Fi client security weaknesses still prevalent
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …
Sourcefire goes beyond the sandbox
Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …
U.S. Congress has questions about Google Glass and privacy
Members of the U.S. Congress’ Bi-Partisan Privacy Caucus have sent an open letter to Google CEO Larry Page, questioning the company’s privacy consideration when it …
Jailed hacker designs device to thwart ATM card skimming
A Romanian hacker that has been jailed for his involvement with a criminal gang that planted ATM skimmers and stole card information has designed a new device aimed at …
Cyber espionage campaign uses professionally-made malware
Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …
Digital Government Strategy progress and challenges
A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …
Over 45% of IT pros snitch on their colleagues
Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …
Form-grabbing rootkit sold on underground forums
There seemingly no end to the automated tools that aspiring cyber crooks can buy on underground forums. The latest of these discovered by Webroot’s Dancho Danchev is …
U.S. DOD decides iPhones and iPads can connect to its networks
The Defense Information Systems Agency (DISA) of the U.S. Department of Defense has approved the use of government-issued iOS 6 devices when connecting to its military …
Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Barracuda updates web application firewall
Barracuda Networks announced Barracuda Web Application Firewall 7.8, specifically aimed at reducing the impact of automated attack attempts from botnets. Automated botnet …
Week in review: Human sensors, IT security jobs, and hacking car charge stations
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Police unable to decrypt iPhones, asks Apple to do it Court …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices