WikiLeaks publishes Stratfor emails stolen by Anonymous
WikiLeaks has begun publishing internal emails exfiltrated from the systems of strategic intelligence company Stratfor and has teamed up with 25 media organizations who will …
Compromised websites from a site owner’s perspective
Malicious actors are often able to compromise legitimate websites without the site owners’ knowledge: over 90% of respondents didn’t notice any strange activity, …
Careless management of crucial security instruments
A staggering 72% of respondents to a Venafi survey admitted that they have no automated process to replace compromised certificates. This means that if their CA vendor is …
Log management deserves a company’s respect
Keeping and maintaining data logs is a corporate best practice and, in many cases, when you consider regulation and industry standards, it’s the law. Still, few …
HITBSecConf2012: Revamped live hacking competition
What first began as a small gathering for computer security enthusiasts in 2002, Hack In The Box Security Conference (HITBSecConf) has since grown into a must attend event in …
Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights
Week in review: The danger of self-selected PINs, researchers break video CAPTCHAs, and the Consumer Privacy Bill of Rights Here’s an overview of some of last …
10.8 million Android devices infected with malware
From 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals, according to NQ Mobile. In 2011, newer and more …
White House announces Consumer Privacy Bill of Rights
As the privacy of Internet user seems to be eroding with every passing day and online companies can’t seem to guarantee them that their personal information will not be …
Bogus “Scan from a HP OfficeJet” notifications lead to malware
Notifications about documents purportedly having been scanned and sent via a HP OfficeJet printer/scanner are targeting users again and trying to trick them into opening the …
Tips to minimize the risk of identity fraud
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud. Prevention 1. Keep personal data …
No skeleton key: Protecting your organization on the web
Weaknesses in the SSL protocol or the public certificate authority ecosystem that underpin it have received a lot of coverage recently and the last couple of weeks have been …
Password amnesia and online identity
The use of multiple passwords is posing a security risk to individuals and businesses alike, according to Ping Identity. A new study, which surveyed 2,000 consumers, …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days