U.S. judge says FBI can’t hack crime suspect’s computer
A judge of the U.S. District Court for the Southern District of Texas has denied FBI’s petition to install spying software on and using the built-in camera of an …
Who to call when hit by a DDoS attack
Recent reports all point to the same fact: despite the different motives of the attackers, DDoS attack have become more frequent and more intense. So what are businesses and …
CISPA is (practically) dead, says Senate representative
There’s finally some good news for CISPA opponents: according to a representative of the U.S. Senate Committee on Commerce, Science and Transportation, the Senate is …
Phishing attacks skyrocketing
A new phishing survey by the Anti-Phishing Working Group (APWG) reveals that phishers are breaking into hosting providers with unprecedented success, using these facilities to …
35% of businesses experienced a DDoS attack in 2012
When DDoS attacks hit, organizations are thrown into crisis mode. From the IT department to call centers, to the boardroom and beyond, it’s all hands on deck until the …
Data breaches increase IT budgets
Protecting brand reputation and observing security best practices should be organisation’s primary motivators for data protection, while meeting compliance requirements …
U.S. government doesn’t need CISPA to monitor communications
Civil rights and privacy advocates are mobilizing their forces to combat the passing of Cyber Intelligence Sharing and Protection Act (CISPA), but documents obtained by …
Hosted virtual desktops can increase security
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner. Properly …
Software for complex Android device security needs
Wind River has introduced three Solution Accelerators for Android Security that allow developers to quickly begin working on security requirements for Android-based devices. …
GFI Software adds patch management to GFI Cloud
GFI Software announced the addition of patch management capabilities to its cloud-based platform for the delivery of services via a web-based user interface. Small to …
Fake “New incoming fax” notification carries malware
Sophos researchers have spotted an active malicious spam campaign impersonating the DuoFax internet fax service, claiming that the recipient has received a fax: You might not …
Travelers to Israel can get their emails searched on entry
Travelers who enter Israel via the international Ben-Gurion Airport, especially those who aren’t Israeli citizens, can be asked by Shin Bet (the country’s security …
Featured news
Resources
Don't miss
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management