Please turn on your JavaScript for this page to function normally.
Quick response, quick risk?

You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little …

Simple steps to ensure online safety

Resent research into internet use by teenagers conducted for GFI Software revealed that one in three parents do not know if Internet safety tips are being taught to their …

Smaller DDoS attacks can be deadlier than big ones

Contrary to conventional thinking that large bandwidth cyber attacks wreak the most damage on enterprises, security experts at Radware instead found that bigger problems …

Windows privilege management with enterprise reporting capabilities

Avecto has unveiled the latest version of its Privilege Guard technology, developed to enable organizations to give all users the privileges they need to remain productive …

CRISC certification: Reacting to a radically changing IT landscape

The number of IT professionals seeking the CRISC (Certified in Risk and Information Systems Control) certification continues to rise rapidly. More than 16,000 professionals …

Viral Facebook spam campaign delivers malware

If you spot a Facebook friend of yours worrying about and linking to news about the US attacking Iran and Saudi Arabia, curb your curiosity and don’t follow the link if …

Compromised DreamHost-hosted websites lead to scams

Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …

Week in review: Reactions to VeriSign hack, Anonymous leaks FBI conference call, and the new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news, podcasts, reviews and articles: The F-BOMB: A tiny $50 spying computer for DARPA As …

Anonymous leaks FBI conference call on hacking investigations

Anonymous resumed today its F**k FBI Friday campaign by publishing a 16-minute-long mp3 recoding of a confidential conference call between representatives of the FBI and the …

Server-side polymorphic Android apps

Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …

Attackers use fake friends to blend into Facebook

A new Barracuda Labs study provides an example of an increasing number of attackers move to social networks to carry out their wares. The study analyzes a random sampling of …

Kelihos botnet rises up again

Kelihos – the botnet whose operation was disrupted last September by Microsoft and Kaspersky Lab by shutting down its C&C servers and making its bots contact a …

Don't miss

Cybersecurity news