Penetration testing tool masquerades as surge protector
In the same way that a hardware keylogger may remain undetected by office workers, Power Pwn – a newly created piece of hardware resembling a power strip or surge …
Dropbox says there is no evidence of breach, continues investigating
Last week European Dropbox users began receiving spam emails advertising gambling websites, and given that many of them received it on unique email address created for the …
Fake Intuit emails lead to malware
Emails purportedly sent by US tax preparation software and services company Intuit and professional social network LinkedIn have been hitting inboxes in the last week, posing …
Open source smart meter hacking framework released
SecureState announced the release of the full open source code of Termineter, a framework that allows users to assess the security of Smart Meter utility meters over the …
Detecting mobile device vulnerabilities using Nessus
This video by Paul Asadoorian shows you how to enable and use the Nessus plugins which identify mobile devices and vulnerabilities from your MDM (Mobile Device Management) servers.
Free data masking download
Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …
iOS digital identity app WISeID 4.0 released
WISeKey lauched WISeID 4.0 for iOS. The digital identity app can create an accountable identity from its personal data organizer, which securely stores private details such as …
Good Technology enhances enterprise mobility solutions
Good Technology announced the addition of Good Dynamics AppKinetics to its Good Dynamics platform, which helps protect enterprise data in transit, at rest, and in use on …
Hadoop: The Definitive Guide, 3rd Edition
Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. …
Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East
Here’s an overview of some of last week’s most interesting news, articles and reviews: How to make smart grids To prepare for a successful roll-out of smart grids, …
Learning passwords you can use but not remember
How can you make sure that you’ll never share your password with anyone, even under threat of bodily harm, or other illegal and illegal type of coercion? The answer is …
Pinterest starts blocking hacked accounts, investigates
Pinterest spam and scams are nothing new. Spammers usually use newly created accounts to do it, and Pinterest scam toolkits have surfaced to help them in their efforts. But it …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?