Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify APTs, categorize them according to risk level, and prioritize your actions accordingly …
Microsoft revokes 28 of its code-signing certificates
The long awaited patch for the CVE-2012-1889 vulnerability that has been heavily exploited in the wild and the exploit for which has even been included in the Blackhole …
Formspring breach and leak triggers massive password reset
Formspring, a social Q&A website popular with teenagers, is the latest site to have its servers breached and the passwords of its users compromised by hackers. According …
Trojan found being offered on Google Play for weeks
Symantec researchers have recently discovered Android malware being offered on Google Play, posing as legitimate game apps “Super Mario Bros.” and “GTA 3 …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Targeted attacks focus on small businesses
36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees, according to Symantec. During the first …
Anti-theft Wi-Fi tag for laptops and tablets
Ekahau launched its newest Wi-Fi tag, the L4 Laptop tag. The L4 tag is a small flat unit designed to be plugged into the ExpressCard slot. The tag works with the Ekahau RTLS …
Multi-platform backdoor served through compromised website
The compromised website of a Colombian transport company has been found serving a signed Java applet that detects whether the visitor is using a Windows, OS X or Linux machine …
US-based machines preferred by malicious pay-per-install networks
Pay-per-install affiliate networks looking for compromised computers to get their malicious wares installed on have a definitive predilection for machines located in developed …
CompTIA Security+ Rapid Review
Assess your readiness for CompTIA Security+ Exam SY0-301 and identify where you need to focus and practice. This practical guide walks you through each exam objective, …
Microsoft releases nine security bulletins
The Microsoft Security Bulletin Summary for July 2012 contains nine security bulletins addressing 16 CVEs. Three of the bulletins are rated critical and the other six are …
Best Buy warning users of account compromise?
Best Buy has apparently been deactivating some of its users’ accounts and notifying the owners about it via email. “We are currently investigating increased …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices