Please turn on your JavaScript for this page to function normally.
Schneider electric products multiple vulnerabilities

Multiple vulnerabilities have been reported in multiple Schneider Electric products, which can be exploited by malicious people to conduct cross-site scripting attacks, …

Twitter acquires Moxie Marlinspike’s startup

Well-known security researcher and speaker Moxie Marlinspike’s startup Whisper Systems has been acquired by Twitter. The official announcement says: The Whisper Systems …

Apache reverse proxy flaw opens door to internal networks

Apache has confirmed the existence of a new reverse proxy vulnerability after it was discovered by Prutha Parikh, a security researcher with Qualys, while she was creating a …

Three charged for ATM skimming spree

Three men allegedly responsible for a ATM skimming spree that resulted in the theft of debit card numbers of nearly 1,500 individuals and the loss of over $285,000 in …

Anonymous bloggers in danger of being exposed

You’re a blogger who, for whatever reason, wishes to remain anonymous. You are careful not to mention anything that could tie the blog to you, and you have gone through …

Week in review: Rogue web browsers, the most vulnerable smartphones, and secure practices for online shopping

Here’s an overview of some of last week’s most interesting news, podcasts and articles: Secure practices for online shopping These simple steps apply to everyone …

Phishers prefer real money to virtual funds

October was rich in sensational events which, as usual, the spammers exploited to the full, says Kaspersky Lab. Mass mailings were registered that referred to the death of …

New UK Cyber Security Strategy revealed

The UK Government’s Cabinet Office has published today a new Cyber Security Strategy whose aim is, among other things, to make the UK one of the most secure places in …

“PayPal email address change” phishing scheme doing rounds

PayPal users are targeted again as emails supposedly sent by the online payment company urge them to fill out a form with their personal and financial information in order to …

40% of orgs doubt effectiveness of disposal procedures of old PCs

UK organizations aren’t certain that all data and settings are deleted from devices prior to disposal, say the findings of a recent survey by user and infrastructure …

Bosnian hacker collected, distributed massive amounts of illegal porn

A Bosnian national, identified only by the initials E.S., has been arrested by agents of the Bosnian Federal Police’s cybercrime unit following the discovery of a …

ISPs can’t be forced to filter file-sharing traffic, says EU court

European ISPs will not be required to filter electronic communications which use file-sharing software in order to prevent file sharing which infringes copyright, the European …

Don't miss

Cybersecurity news