Mozilla asks CAs in its root program to revoke all MitM certificates
Following the big brouhaha raised by Trustwave’s acknowledgement that it has revoked a “MitM” subordinate root certificate it issued to a business for its …
Multi-layered cloud security for banks
ActivIdentity announced integrated fraud detection service and authentication capabilities for its 4TRESS Authentication Appliance. The all-in-one platform and cloud-based …
“Ex-girlfriend sex video” Facebook scam
Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …
Syrian dissidents claim government uses malware to spy on them
Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …
Researchers break video CAPTCHAs, offer solutions
After creating the “Decaptcha” software to solve audio CAPTCHAs, Standford University’s researchers modified it and turned it against text and, quite …
British student jailed for hacking Facebook
26-year-old software development student Glenn Mangham has been sentenced to spend eight months in jail following his hack into several Facebook servers between April and May …
Facebook Gold Membership Status scam hits users
A bizarre email purportedly sent by Facebook has been hitting inboxes around the world and trying to convince the recipients that they have been awarded a “100% Gold …
Security and SLAs, the biggest barrier to cloud adoption
45% of European IT decision makers view a lack of security and service level agreements (SLAs) as top concerns for moving to the cloud, according to a survey by Interxion. …
Trend Micro makes HijackThis open source
Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …
Acunetix Web Vulnerability Scanner 8 released
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …
Forensic toolkit with malware analysis technology
AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …
Week in review: Cheap cellphone tracking, Apple’s Gatekeeper, and Google secretly bypasses Safari’s “no tracking” settings
Here’s an overview of some of last week’s most interesting news and articles: Privacy pitfalls of online dating It used to be that you were pretty much anonymous …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it