New BIOS rootkit spotted
Towards the end of 2011, a Chinese company detected the first rootkit ever that targeted computers’ BIOS in order to be able to reinfect computers over and over again, …
Beware of bogus Facebook hacking tools
Users who are in the market for tools that are supposedly able to hack someone’s Facebook account should be extremely careful when being faced with such an offer. Trend …
The effect of data breaches on consumers
Commenting on a Ponemon Report showing that 72 per cent of consumers who have been notified of a data breach at a company they had dealt were dissatisfied with the …
Facebook unveils new mobile security measures
Facebook has introduced three security updates for protecting its mobile users: a code generator, the ability to report unwanted content on your phone, and improved mobile …
Fake Craigslist notifications lead to exploit kit
Emails purportedly sent by Craigslist have been hitting users’ inboxes and trying to get them to follow the offered link to a website hosting the Blackhole exploit kit, …
Microsoft to release seven bulletins next week
The Microsoft Security Bulletin Advance Notification for June 2012 lists seven bulletins, three of which are rated “critical” and four “important.” The …
Security Metrics, A Beginner’s Guide
Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of …
Last.fm confirms password leak
And Last.fm makes three. Following the revelations that the data leaked by an unknown individual on a Russian forum contained user passwords for business social network …
Android spying app masquerades as Gmail
A new piece of Android malware that has recently been unearthed by NQ Mobile researchers is capable of logging text messages and phone calls, as well as record them, and send …
The ramifications of the LinkedIn password leak
LinkedIn has finally confirmed that some of the passwords that were leaked yesterday correspond to LinkedIn accounts, and has issued a list of steps that they are taking in …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
eHarmony confirms leak of their users’ passwords
News that an unknown individual leaked what appeared to be a batch of 6.5 million LinkedIn passwords on a Russian forum and asked for help in decrypting them spread like fire …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)