Please turn on your JavaScript for this page to function normally.
Web host victims repeatedly exploited by cybercriminals

More than one-third of respondents to an Anti-Phishing Working Group (APWG) survey were repeat victims of phishing attacks that resulted in a successful establishment of …

History and future of mobile malware

Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …

Alleged Spanish, Turkish Anonymous members arrested

News that three Spanish nationals linked to Anonymous have been arrested has been followed by the announcement of the Turkish police that it has detained 32 individuals …

IRISS Conference 2011 call for papers

IRISS will hold its second annual conference on Wednesday the 23rd of November 2011 in Dublin. This is an all day conference which focuses on providing attendees with an …

Foreign government behind IMF breach and data theft?

The International Monetary Fund’s systems have been breached by cyber attackers believed to be linked to a unnamed foreign government. According to the NYT, the hack …

AppSec adds blocking, virtual patching to database activity monitoring solution

Application Security announced new enhancements to DbProtect. Version 6.3 of this database security solution now includes the ability to block real-time attack and …

Week in review: LulzSec attacks, RSA admits compromise of SecurID tokens and new issue of (IN)SECURE Magazine

Here’s an overview of some of last week’s most interesting news and articles: FBI affiliate organization hacked, user database leaked Only a day after they leaked …

Malware writers rely on users not updating

When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs …

LulzSec warns NHS about compromised passwords

As a reaction to the “bucket list” of a girl battling Hodgkin’s lymphoma going viral on the Internet and her call to people to donate bone marrow, LulzSec …

Continued attacks on social networks

GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …

Study examining the usage of hardware-based encrypting drives

The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …

Most organization experienced data loss

75% of UK organizations experienced data loss in the last year, compared with an average of 77% internationally, according to Check Point. Key findings from the survey show …

Don't miss

Cybersecurity news