Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Barracuda updates web application firewall
Barracuda Networks announced Barracuda Web Application Firewall 7.8, specifically aimed at reducing the impact of automated attack attempts from botnets. Automated botnet …
Week in review: Human sensors, IT security jobs, and hacking car charge stations
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Police unable to decrypt iPhones, asks Apple to do it Court …
“Get free followers” scam targets Instagram users
If a service is popular, you can be sure that scammers and spammers will find a way of targeting as many of its users as they can. Trend Micro fraud analyst Karla Agregado …
New Mac spyware signed with legitimate Apple Developer ID
A new piece of malware designed to spy on Mac users has been unearthed by security researcher and hacker Jacob Appelbaum at the Oslo Freedom Conference held this week in …
Ransomware adds password stealing to its arsenal
Slowly but surely, more and more users are becoming acquainted with the existence of ransomware and when faced with one, they opt not to pay the requested “fine” …
Targeted data stealing attacks using fake attachments
ESET has uncovered and analyzed a targeted campaign that tries to steal sensitive information from different organizations, particularly in Pakistan (with limited spread …
A look into the EC Council hack
Update: Wednesday, 22 May 2013 – Tal Be’ery: “We had analyzed a screenshot of what we had thought at the time the current EC council site hack. Later we had …
Four LulzSec hackers handed prison sentences
Four LulzSec members have been sentenced today at Southwark Crown Court for taking part in the 2011 attacks against a series of high-profile websites and publishing user …
Thoughts on the need for anonymity
The other day I was reading a post on BoingBoing about Anonymous getting involved in publicizing the Steubenville and Halifax rape cases, and about a protest rally they …
Application vulnerabilities still a top security concern
Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …
The New Yorker launches anonymous dead-drop tool
Popular U.S. magazine The New Yorker has made available for its potential sources an anonymous dead-drop tool that allows them to send and receive messages and files to the …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits