Researcher demonstrates highly persistent hardware backdoor
Spurred by the conclusion of a recent report that said that given the fact that China is the de-facto manufacturer of most IT equipment in the world, it could easily backdoor …
Sophos releases free anti-virus app for Android
Sophos announced Sophos Mobile Security, a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss – without …
Email from disgruntled buyer leads to eBay phishing page
In these hard economic times, many have turned to eBay for selling things in order to earn a buck. But, in order to be trusted by buyers, the sellers depend on good ratings …
1,500 severe security events detected on Black Hat WLAN
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent …
Tumblr and Twitter users targeted with oddball spam messages
A bizarre spam campaign touting free McDonalds gift cards has recently been spotted on compromised Tumblr and Twitter accounts: According to GFI, the link included in the spam …
Wargame examines the future of US infrastructure
Booz Allen Hamilton concluded the first-ever wargame simulation examining creative infrastructure initiatives and solutions that factor in US transportation needs by the year …
Security storage app for iOS and Android devices
TrustPort launched Portunes, a freeware security storage app that runs on iOS and Android devices. Portunes is an application protecting sensitive data like informationon …
The Computer Incident Response Planning Handbook
The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data …
Week in review: Hidden security risks of top mobile apps, Facebook invites white hats to attack its networks
Here’s an overview of some of last week’s most interesting news, articles and reviews: Penetration testing tool masquerades as surge protector In the same way that …
Researchers beat Google’s Bouncer
When earlier this year Google introduced Bouncer – an automated app scanning service that analyzes apps by running them on Google’s cloud infrastructure and …
Facebook invites white hats to attack its corporate network
Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …
Personal and financial information under attack
Cybercriminals have increased their focus in targeting individuals and organizations of all sizes to steal personal and financial information according to Trend Micro. Among …
Featured news
Resources
Don't miss
- 40 open-source tools redefining how security teams secure the stack
- Password habits are changing, and the data shows how far we’ve come
- Product showcase: Tuta – secure, encrypted, private email
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research