Apps on iOS 6 will require explicit permission to access personal data
Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, …
Democratic govts not immune to censorship attempts, says Google
Judging by the numbers contained in Google’s latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the …
Unpatched Microsoft flaw actively exploited in the wild
When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding “Fix it” mitigation solution last week, …
Six arrested for peddling Android malware in Japan
Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …
Increase in cyber threats and sabotage on critical infrastructure
The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and …
US-CERT warns of Intel CPU flaw
A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. “Some …
Highest paying IT certifications
ISACA’s Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying …
Real life examples on hackers bypassing CAPTCHA
Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …
Predicting Malicious Behavior
Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal …
Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords
Here’s an overview of some of last week’s most interesting news, reviews and articles: Lessons learned from cracking 2 million LinkedIn passwords Like everyone …
SAP security vulnerabilities, metrics and threats
A global report from ERPScan dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals …
Ghost USB honeypot released
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites