Please turn on your JavaScript for this page to function normally.
What really breaks SSL?

After years of being ignored — which is an unusual situation for the protocol that secures the Web — SSL became the focus of the interests of the security …

UK network and ISP study reveals slow speeds and geographic variance

A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …

Protecting mobile phones? Most don’t bother

Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …

TYPO3 multiple vulnerabilities

Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …

Thor’s Microsoft Security Bible

Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …

Malicious fake Firefox update spam run

Fake notices about a Firefox update are again targeting the browser’s users, says Sophos. A rather plain message supposedly coming from Mozilla instructs users to follow …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

SMS spying Android Trojan triggered by keywords

Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …

Anonymous dumps US law enforcement, Brazil’s Federal Police data, hacks Syrian MOD website

It has been another busy weekend for the AntiSec initiative. First Anonymous and LulzSec released a 10GB data dump consisting of the information pilfered from the servers of …

Annual cost of cybercrime highlights need for governance

ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …

“Fidel Castro died” spam run leads to malware

Malware pushers have never balked from using news about a celebrity’s death to trick people into downloading malicious payloads. They also have no problem with faking …

The privacy officer’s agenda according to Gartner

Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …

Don't miss

Cybersecurity news