Engineer jailed for turning PIN Entry Devices into skimmers
A German electronics engineer has been sentenced to three years in a UK prison for having modified a number of PIN Entry Devices to record the information used to clone credit …
Analysis of 250,000 hacker conversations
Imperva released a report analyzing the content and activities of an online hacker forum with nearly 220,000 registered members, although many are dormant. This forum is used …
Offers from domain resellers evade spam filters
The Internet has created a great amount of business opportunities – most of them legal, some not and some that fall in the gray area between the two extremes. An example …
Symantec tackles malicious advertising
Symantec announced AdVantage, a new cloud-based service that will enable website owners to discover malware hidden in online advertisements. Malicious advertising …
Simple online protection steps for seniors
Older Americans, who grew up in the era of rotary-dial phones and black and white TV programming, may still be in the minority among Internet users. They are a rapidly growing …
4 million identity fraud victims in the UK
Identity fraud continues to rise with 4 million victims in UK alone – yet consumers continue to be complacent with their identities. According to research commissioned …
Sesame Street YouTube channel hacked
Followers of the Sesame Street YouTube channel have had a nasty surprise when they tuned in on Sunday. Instead of the children-friendly videos they were faced with pretty …
“Facebook lost your messages” spam returns
Facebook users are constantly targeted by emails posing as legitimate notifications from the popular social network, and the latest ones are an upgraded version of an old fake …
McAfee and RSA partner for compliance and risk management solution
McAfee and RSA announced a new joint solution which integrates security data from the McAfee ePolicy Orchestrator platform (McAfee ePO) with business infrastructure and …
Moving To The Cloud
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors …
Week in review: Trojanized Netflix app, new Sony attack and German government’s Trojan/backdoor
Here’s an overview of some of last week’s most interesting news, articles and photos: Most social networks users don’t keep up with privacy settings changes …
How the German “Federal Trojan” was actually used
After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …
Featured news
Resources
Don't miss
- MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)
- OSPS Baseline: Practical security best practices for open source software projects
- Understanding the AI Act and its compliance challenges
- The art of balancing data security with business goals
- Debunking 5 myths about network automation