Virtual classroom for incident response
To provide digital investigators and other incident responders the tools and skills to detect and respond to targeted attacks, HBGary announced a series of new live online …
Week in review: Big data, patching for industrial cyber security, and the new issue of (IN)SECURE Magazine
Here’s an overview of some of last week’s most interesting news, interviews and articles: Consumers don’t trust banks with personal data Banks top the list …
New ZeuS-based modular rootkit offered to cybercriminals
Given the popularity of the Zeus crimeware, and the fact that its source code has been ultimately offered for sale at bargain basement prices, it’s no wonder that every …
Seagate blog compromised, leads to Blackhole and malware
A blog of well-known hard disk drive manufacturer Seagate has been compromised to contain malicious iFrame injections that redirect users to websites hosting the Blackhole …
Reuters editor indicted for allegedly helping Anonymous hack news site
A former web producer for a Tribune Company-owned television station in Sacramento, Calif., was charged today in an indictment for allegedly conspiring with members of the …
Japanese student sets up free VPN service
There are a lot of people around the world that would like to bypass firewalls set up by their governments, but not everybody can afford to do it. Enter Daiyuu Nobori, a …
Patching for industrial cyber security is a broken model
New research from Belden shows that patching is often ineffective in providing protection from the multitude of vulnerability disclosures and malware targeting critical …
Apple releases OS X 10.8.3
The 10.8.3 update is recommended for all OS X Mountain Lion users and includes features and fixes that improve the stability, compatibility, and security of your Mac. The …
Encrypting Trojan targets users, demands $5,000
Russian anti-virus company Doctor Web is warning users of an active ransomware campaign executed through brute force attack via the RDP protocol on target machines. Once …
Doctors used silicone fingers to fool fingerprint scanner
Fingerprint scanners might not work with severed fingers, but artificial ones still manage to fool them, as proved by the recent discovery of a fraudulent scheme set up by …
Identity fraud is up, but banks are up to the security challenge
In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …
Fake Pope Twitter account proves malicious potential of breaking news
Mere minutes after it become publicly known that Argentinian cardinal Jorge Mario Bergoglio was elected to serve as the new Pope, Internet users around the world began …
Featured news
Resources
Don't miss
- Superagent: Open-source framework for guardrails around agentic AI
- Security chaos engineering matters when nothing is broken
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity