Chrome 22 released, researchers awarded $30K in bug bounties
Chrome v22 has been released, and with it over 40 vulnerabilities – 15 of which high-severity – have been closed. Google’s reward program for the responsible …
“Watering hole” sites crucial to new cyber espionage campaign
RSA’s newly dubbed FirstWatch research team has recently presented their findings on a “water holing” campaign that they first spotted back in July. The …
Rental computers spied on and photographed users, FTC claims
Seven rent-to-own companies and a software design firm have agreed to settle Federal Trade Commission charges that they spied on consumers using computers that consumers …
EU-funded research to make the cloud greener
A special 3D microchip, being designed by an EU-funded research project, looks set to drastically cut the electricity and the installation costs of servers in cloud computing …
IEEE data breach demonstrates need for increased server-level security
According to news reports, the usernames and passwords of 100,000 members of the Institute of Electrical and Electronics Engineers (IEEE) have been found unencrypted on a FTP …
Bogus Facebook photo notification carries malware
A new Facebook-themed spam campaign is targeting the social network’s users, trying to trick them into opening the attached file: “The attached ZIP file has the …
Open source self-service cloud portal
ScaleXtreme released free open source software for companies to build internal cloud dashboards and self-service portals for developers and other end-users. The technology …
How to prevent a botnet infection?
The research team at e-mail security provider Eleven, published five tips today to help users prevent a botnet infection on their computer. Botnets are groups of hijacked …
Dissatisfaction with the current state of backup
ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up …
Most 5 year olds already use an Internet enabled device
Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently …
F-Secure Mobile Security protects Android TVs and set-top boxes
F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …
Malicious phpMyAdmin served from SourceForge mirror
A malicious version of the open source Web-based MySQL database administration tool phpMyAdmin has been discovered on one of the official mirror sites of SourceForge, the …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research