How to recognize rogue online pharmacies
As the prices of pharmaceuticals keep rising, so does the popularity of online pharmacies. Crooks noticed the high earning potential of rogue online pharmacies from the very …
Backdoor Trojan masquerading as KLM e-ticket
As many flyers tend to book their tickets online and receive them in electronic form, it’s no wonder that malware peddlers often choose to deliver their malicious wares …
Stolen card data on sale on professional-looking e-shop
The theft of debit and credit card information has become a lucrative business, but sometimes the individuals that engage in the stealing are not so eager to user the …
Facebook turns off facial recognition in Europe
Facebook has assented to keeping the facial recognition feature (“Tag Suggest”) for its European users off until European regulators allow it to be reinstated, and …
Big Data grows as data security shrinks
A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of “Big Data,” most organisations are actually keeping looser tabs …
Decoding digital danger: The ever-moving threat
It was announced recently that GCHQ, the Government’s electronic intelligence unit, is to advise Britain’s senior business leaders on how to oppose the mounting …
Gartner says Windows 8 is a big gamble
Microsoft is taking a big gamble over the next few months with Windows and Office, the two products responsible for most of its revenue and profit, according to Gartner. It is …
Learning Unix for OS X Mountain Lion
Beneath OS X easy-to-use GUI interface lies a powerful Unix engine. Mac users have Unix, as well as a host of tools ported over from Linux, at their fingertips; the just need …
Week in review: IE zero-day patched, Flame C&Cs reveal more malware, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news and articles: Google adds Do Not Track support to Chrome The next official release of …
Microsoft patches IE zero-day and Flash flaws in IE 10
Microsoft has delivered on its promise and has issued a security update for Internet Explorer to address the zero-day memory-corruption vulnerability in versions 9 and earlier …
Yet another global cyber espionage campaign tied to China
A new cyber espionage campaign targeting energy and military companies and organizations has been unearthed by the researchers of Dell SecureWorks Counter Threat Unit Threat …
Ex-CME programmer admits to stealing source code
A former senior software engineer for Chicago-based CME Group pleaded guilty to theft of trade secrets for stealing computer source code and other proprietary information …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)