Ransomware uses browser history to persuade users to pay up
A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …
Nebula One: The first enterprise cloud computer
Nebula today unveiled Nebula One, the first enterprise cloud computer, built from the ground up to power big data, web, and mobile applications. Nebula One is a turnkey …
DoS attacks expose enterprise infrastructure vulnerabilities
Lurking in the shadows for nearly a decade, DoS and DDoS attacks are making a resurgence. Several high-profile assaults on the world’s leading financial firms and other …
IEEE to explore 400 Gb/s Ethernet
IEEE, the world’s largest professional organization advancing technology for humanity, today launched an IEEE 802.3 “Standard for Ethernet” study group to …
Armor for your Android apps
This defensive security talk from Shmoocon 2013 is primarily targeted towards Android developers. The speaker shares “war stories” of Android vulnerabilities and …
Complex malware and BYOD drive mobile security
Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …
Airlock launches secure cloud hosting
Airlock launched its Secure Cloud Platform which offers enterprise-level security features like intrusion detection, hardware and web application firewalls, DDoS mitigation …
Week in review: Massive DDoS attack targets Spamhaus, Amazon S3 buckets leaking, and cyber espionage deterrence
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: What do users look for in a security solution? Users are aware of …
Spammers bypass spam filters with Google Translate links
Google Translate is the latest trick in spammers’ arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by evaluating (among other …
US starts gradually removing Chinese IT equipment from federal systems
A new law concerning funds given to U.S. federal agencies has been signed by President Obama, and it says that Departments of Commerce and Justice, NASA, and the National …
Microsoft releases privacy and security guide for policy makers
Microsoft released the third volume of its popular policymaker booklet, Building Global Trust Online, which includes considerations and guidance for a number of new …
OpenStack security brief
This video from Shmoocon 2013 is a break down of security concerns relating to OpenStack cloud software. OpenStack is an open source IaaS solution compatible with Amazon EC2 / …
Featured news
Resources
Don't miss
- Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
- 1Password open sources a benchmark to stop AI agents from leaking credentials
- Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)
- When security decisions come too late, and attackers know it
- OpenClaw Scanner: Open-source tool detects autonomous AI agents