What really breaks SSL?
After years of being ignored — which is an unusual situation for the protocol that secures the Web — SSL became the focus of the interests of the security …
UK network and ISP study reveals slow speeds and geographic variance
A study by Pando Networks revealed striking disparities between the theoretical and real-world download speeds for British broadband users. By tracking the end-user speeds for …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
TYPO3 multiple vulnerabilities
Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …
Thor’s Microsoft Security Bible
Thor’s Microsoft Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a …
Malicious fake Firefox update spam run
Fake notices about a Firefox update are again targeting the browser’s users, says Sophos. A rather plain message supposedly coming from Mozilla instructs users to follow …
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
SMS spying Android Trojan triggered by keywords
Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …
Anonymous dumps US law enforcement, Brazil’s Federal Police data, hacks Syrian MOD website
It has been another busy weekend for the AntiSec initiative. First Anonymous and LulzSec released a 10GB data dump consisting of the information pilfered from the servers of …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
“Fidel Castro died” spam run leads to malware
Malware pushers have never balked from using news about a celebrity’s death to trick people into downloading malicious payloads. They also have no problem with faking …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark