Hacker compromises email accounts of Bush family members
A hacker by the online handle “Guccifer” has apparently managed to compromise email accounts belonging to the Bush family and some of their close friends, from …
Twitter users hit with typo-squatting phishing campaign
In the wake of last week’s compromise of 250,000 Twitter accounts comes another threat to Twitter users: phishing messages – both DMs and tweets – that lure …
Bogus cleaning apps on Google Play install backdoor on PCs
Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …
Children turning into malicious code developers
In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …
Five safety tips for Valentine’s Day
Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra …
PCI DSS cloud computing guidelines
The PCI Security Standards Council (PCI SSC) published the PCI DSS Cloud Computing Guidelines Information Supplement, a product of the Cloud Special Interest Group (SIG). …
Privacy and security incident management for healthcare
A lost laptop or lost paper files can put a healthcare organization in a tailspin, especially if they contain the protected health information (PHI) of thousands of patients. …
EU cybercop: European Cybercrime Centre to focus on criminal gangs
The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …
Learn by doing: Phishing and other online tests
As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …
Microsoft to patch 57 vulnerabilities
The February 2013 Microsoft Patch Tuesday bulletin was released with 12 advisories and is bigger than average, which means security and IT teams will be busier than average. …
Critical flaw lets attackers control hospital, military buildings’ systems
A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …
Despite concerns, smartphone hotspot adoption grows
Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …
Featured news
Resources
Don't miss
- Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287)
- Microsoft blocks risky file previews in Windows File Explorer
- Building trust in AI: How to keep humans in control of cybersecurity
- Researchers expose large-scale YouTube malware distribution network
- Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932)