Windows 8 Secrets
Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally …
Publishing firm says leaked Apple IDs came from their servers
BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …
Pirate Bay’s Svartholm arrested for hacking, not piracy
Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a “crime related to information technology,” …
Windows 8 users open to Flash exploits
Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
New program offers pathway into cyber security field
(ISC)2 launched the (ISC)2 Young Professionals, a new group designed to help cultivate the information security workforce of the future. The pilot stage of the program will …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Apache HTTP Server set to ignore IE10’s Do Not Track request
Microsoft’s decision to make Internet Explorer 10 in Windows 8 have the “Do Not Track” (DNT) option turned on by default has stirred a heated discussion …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Data breaches expose 94 million records in the government sector
An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 …
87% have something to hide on their smartphones
When it comes to the almost weekly reports of celebrity phone hackings and leaks, more than half of consumers believe these are merely stunts to garner publicity. In the end, …
AlgoSec enhances firewall policy management suite
AlgoSec announced version 6.3 of its Security Management Suite, which simplifies the operational and security challenges of managing firewall policies. The suite pffers …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)