Commission wants to minimize U.S. IP theft economic impact
As the long awaited first meeting between China’s new president Xi Jinping and U.S. president Barack Obama draws near, the problem of cyber espionage and theft of …
Guantanamo cuts off Wi-Fi access due to OpGTMO
The U.S. military, under whose command is the Guantanamo Bay Naval Base and the infamous prison of the same name that currently houses over 150 prisoners, has decided to shut …
NYPD detective accused of hiring email hackers
Edwin Vargas, a detective with the New York City Police Department, has been arrested on Tuesday for computer hacking crimes. According to the complaint unsealed in Manhattan …
Experts highlight top data breach vulnerabilities
Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker. …
Why BYOx is the next big concern of CISOs
Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information …
Free tool repairs critical Windows configuration vulnerabilities
Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and …
IT pros focus on cloud security, not hype
Cloud computing is exceeding expectations, according to a CA report. Respondents indicate the cloud has moved beyond adolescence and is on the path to maturity in the …
Blue Coat to acquire Solera Networks
Blue Coat Systems has entered into an agreement to acquire Solera Networks, a provider of big data security intelligence and analytics for threat protection. The Solera …
APT1 is back, attacks many of the initial U.S. corporate targets
The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …
US DOJ accuses journalist of espionage
Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …
A closer look at Mega cloud storage
Once a novelty, nowadays many cloud storage services are fighting for their piece of the market in the virtual world. Today I’m taking a look at Mega, a service that …
Aurora attackers were looking for Google’s surveillance database
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)