Info-stealing Dorkbot worm spreading on Facebook
The Dorkbot worm, which first appeared in 2011 and has since been spreading via removable drives, IM programs and social networks, is currently targeting Facebook users. The …
Intelligent vulnerability management from CORE Security
CORE Security launched Insight 3.0, which delivers multi-vector vulnerability assessment, asset categorization, threat simulation, penetration testing and security analytics, …
Private messages of Bloomberg clients end up online
Mere days after Bloomberg News admitted that its journalists could access some client information via the company’s financial terminals, it has been revealed that the …
Is Microsoft reading your Skype communications?
The question of whether Skype – a Microsoft subsidiary since May 2011 – allows U.S. intelligence and law enforcement agencies to access the communications …
Mobile crimeware and the global criminal marketplace
The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisticated criminal technical innovation …
IT security jobs: What’s in demand and how to meet it
The information security job market continues to expand. In fact, according to a report by Burning Glass Technologies, over the past five years demand for cybersecurity …
Password meters actually work
Password strength meters work, but only when users are choosing or changing passwords for “important” accounts, a group of researchers has found. They also …
Internet scams that dominated in 2012
The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …
Tips for validating DDoS defenses
Prolexic has issued a number of recommendations that organizations can use to validate their DDoS defenses, as well as protection services they receive from mitigation …
New 2-factor authentication for the finance industry
OneID released OneID Confirm, a customizable two-factor authentication solution. It is based on the same architecture as the OneID Suite, a set of integrated digital identity …
Belkin releases secure switch for government agencies
Belkin released its Advanced Secure KM Switch and its Advanced 8 & 16-port Secure DVI-I KVM Switches. Both product sets are designed for government agencies and financial …
Microsoft fixes 33 vulnerabilities
Today for Patch Tuesday, Microsoft and Adobe are both coming out with critical fixes for a number of widely installed and attacked programs. Microsoft has 10 bulletins …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits