Scan, monitor and analyze SSL-encrypted communications
SSL Locksmith exposes the contents of SSL-encrypted network communications, which eliminates a critical cyber security blind spot. Many network and security applications are …
Xbox Live accounts hack performed by attackers that hit Krebs and Honan?
Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social …
LogRhythm and Rapid7 partner on threat protection and security analytics
LogRhythm and Rapid7 announced API-level integrations of the LogRhythm SIEM 2.0 platform with both the Rapid7 Nexpose vulnerability management product and the Rapid7 …
South Korean organizations under cyber attack
A suspected cyber attack has paralyzed computer networks at three broadcasting organisations and two banks in South Korea. The organizations’ networks had been …
Protecting sensitive information on iOS devices
We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …
Linux community adopts UEFI technology
The Unified Extensible Firmware Interface (UEFI) Forum, a non-profit industry standards body of leading technology companies that promotes firmware innovation by creating …
ID Network Attributes provides insight into identity risk
ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction. Available in both Fraud …
Massive Chameleon botnet steals $6M per month from advertisers
Web traffic analytics firm spider.io has discovered a massive botnet that emulates human visitors in order to earn its master(s) over $6 million per month from online …
Malware pushers poison MSN Messenger search results
As the date when the MSN Messenger is scheduled to be phased out speedily approaches, it is getting harder to find an installer for it online, so malware peddlers gave rushed …
Internal name SSL certificates could be exploited for MitM atacks
The Certificate Authority practice of issuing “Internal Name” certificates for private domains which are currently non-resolvable by the Domain Name System could …
Hacking as an act of war
Once the exclusive domain of a small number of geniuses, hacking has gone mainstream as an element of national defense. The United States has established a four-star Cyber …
Security firm publishes details about Java issue, asks for second opinion
Making good on their promise, Security Exploration has published technical details about a Java issue that they consider to be a security vulnerability, but Oracle has …
Featured news
Resources
Don't miss
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall
- Google fixes Android vulnerabilities “under targeted exploitation” (CVE-2025-48633, CVE-2025-48572)
- How a noisy ransomware intrusion exposed a long-term espionage foothold
- Creative cybersecurity strategies for resource-constrained institutions