Virtual appliance fuels Bring Your Own Identity
NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …
Freezing Android devices to break disk encryption
Two German computer scientists have proved that it’s possible to access and recover data from an encrypted Android smartphone by performing a set of simple and easily …
How to successfully submit conference talks
There are many ways a security professional can increase his public profile, and one of these is speaking at a conference. However, getting your work accepted at an event is …
Facebook malware campaign targeting Bulgarian users
“Being” on Facebook brings its own set of dangers, and among them is inadvertently downloading malware by clicking on links posted by your own …
Fake invoices in personalized emails deliver ransomware
When a business, social network or any other online service that you use or have signed up for sends you an email, they address you by the name you provided. This is one of …
Facebook employees ambushed by zero-day exploit
Facebook is the latest big company to admit that they have been targeted with a “sophisticated” attack. The attack was triggered when a small number of Facebook …
Week in review: Bit9 hack, malicious applications of augmented reality, and Adobe 0-day mitigation
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Bit9 hacked, its certificates stolen and used to sign malware Bit9, …
Researchers reveal the identity of a Chinese hacker
It all started with Joe Stewart, director of malware research at Dell SecureWorks, who when investigating an unusual piece of malware and the command nodes which it contacted …
Most Americans think cyber warfare is imminent
A national survey of Americans shows a majority fear that cyber warfare is imminent and that the country will attack or be attacked in the next decade. Despite the threat, …
Uyghur Mac users targeted with spear-phishing emails
Uyghur activists are, once again, targeted with spear-phishing emails whose goal is to set up a backdoor on the victims’ computers. The Uyghurs are a Turkic ethnic …
Featured news
Resources
Don't miss
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount
- Shadow AI: New ideas emerge to tackle an old problem in new form
- AI chatbots are sliding toward a privacy crisis
- You can’t audit how AI thinks, but you can audit what it does