U.S. President to decide on pre-emptive cyberstrikes
As the moment when U.S. President Barack Obama will issue a cybersecurity executive order slowly draws near, other questions that affect the nation’s cyber defense and …
None of the 100 largest e-commerce sites have fully implemented DNSSEC
The biggest brands in e-commerce are overlooking a critical security technology that could reduce the risk of identify theft and credit card fraud. An analysis of the 100 …
Japan holds first hacking contest backed by government
Despite being one of the greater world economies and being technologically advanced as few others, Japan has woken up to the reality of cyber crime relatively late. The highly …
Oracle releases MySQL 5.6
Oracle today announced MySQL 5.6, the world’s most popular open source database. With increased performance, scalability, reliability and manageability, MySQL 5.6 helps …
Ad network site hack results in popular sites flagged as malicious
Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …
Fake Amazon Kindle receipt leads to persistent malware
Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …
Digital certificates and malware: a dangerous mix
In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …
Business is booming for exploits, mobile malware
Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …
Cisco unveils open networking “fabric” for data centers, clouds
Network speed, latency, and greater network port density in a single unit are key considerations for customers deploying virtualized data centers and moving to a managed cloud …
Hackers breach U.S. Energy Department networks
Notifications sent out to employees and contractors of the U.S. Department of Energy have confirmed that it and its networks have been the latest victim of …
FTC urges mobile platforms to consider offering Do Not Track
The explosive growth of mobile services allows consumers to do things that would have been hard to imagine only a few years ago, but at the same time, mobile technology raises …
Dutch hacker imprisoned for trafficking 100,000 credit cards
A Dutch citizen who was arrested and extradited from Romania was sentenced to 12 years in prison for a computer hacking and credit card fraud scheme that victimized people …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices