Tweet your way to a VIP ticket to HITBSecConf2013 in Amsterdam
Hack In The Box launched the #HITB1337Giveaway – A Twitter based competition that will see one lucky winner not only walk away with a VIP ticket to the triple track …
Pope’s resignation exploited by Twitter spammers
The announcement of the resignation of Pope Benedict XVI later this month has taken the world by surprise, but spammers were quick to react to the news by flooding Twitter …
BYOD is just the tip of the iceberg
The growth in cloud storage devices means that corporate IT departments are now at the mercy of consumer-based applications, as more and more employees look to take their work …
Bit9 hacked, its certificates stolen and used to sign malware
Bit9, a security firm that provides software reputation, application control and whitelisting services to companies in the financial, technology, government and other sectors, …
Cybersecurity concerns of online dating
ThreatMetrix announced several ways for consumers to stay protected from online dating fraud and malware as Valentine’s Day approaches. According to Fast Company, online …
Identity theft protection tips
More than 11.6 million adults were victims of identity theft in 2011, according to Javelin Strategy & Research. Child identity theft is also a significant problem, which …
Week in review: Critical Flash update, Bamital botnet takedown, and children turning into malware developers
Here’s an overview of some of last week’s most interesting news, reviews, articles and interviews: Federated single sign-on to dominate by 2016 A well-executed …
Windows and OS X users under attack, update Flash now!
Adobe has pushed out an emergency Flash update that solves two critical vulnerabilities (CVE-2013-0633 and CVE-2013-0634) that are being actively exploited to target Windows …
Hacker compromises email accounts of Bush family members
A hacker by the online handle “Guccifer” has apparently managed to compromise email accounts belonging to the Bush family and some of their close friends, from …
Twitter users hit with typo-squatting phishing campaign
In the wake of last week’s compromise of 250,000 Twitter accounts comes another threat to Twitter users: phishing messages – both DMs and tweets – that lure …
Bogus cleaning apps on Google Play install backdoor on PCs
Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …
Children turning into malicious code developers
In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance