Cyber incident reporting in the EU
ENISA took a snapshot of existing and future EU legislation on security measures and incident reporting. Their analysis underlines important steps forward, but also identifies …
Smart Grid Infrastructure & Networking
With contributions from more than 30 experts, Smart Grid Infrastructure & Networking describes cutting-edge technologies for connecting the electrical power …
Week in review: Multi-platform malware, new trends in BYOD, and Google setting up privacy team
Here’s an overview of some of last week’s most interesting news, articles and reviews: 92% of the top 100 mobile apps have been hacked Ninety-two percent of the …
Crisis malware doesn’t affect most VMware hypervisors
A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …
“Compensation for Scam Victims” 419 scam doing rounds
The psychology and economics behind the so-called Nigerian advanced fee fraud scams have been recently been explained by Microsoft researcher Cormac Herley in great detail, …
Female Android users targeted with Loozfon Trojan
An information-stealing piece of Android malware that is currently being used in a campaign aimed specifically at female Japanese users has been spotted by Symantec …
Safe Money technology protects online purchases
It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …
Aramco hackers threaten to attack oil giant again
The group of hackers that claimed responsibility for the recent Saudi Aramco breach has announced that it will be targeting the company again because they want to prove that …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
IDC finds increased adoption of storage efficiency technologies
The rapid increase in the amount of digital data that needs to be stored is pressuring organizations to increase capital expenditures associated with the acquisition of …
US Feds shutter three Android app pirate sites
For the first time since it has started the war against illegal sites, the US Department of Justice has swooped on three websites that were engaged in the illegal distribution …
Bogus Booking.com emails carry malware
The popularity of the Booking.com, one of the world’s biggest and most used online hotel reservations agency is getting misused in the latest malware distribution …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring