UK enterprises fear EU Data Protection Act
The proposed EU General Data Protection Regulation could spell trouble to UK businesses, says independent IT integrator SecureData, as its “EU General Data Protection …
Researchers link string of breaches to Chinese man
Security researchers rarely managed to trace hacking attacks back to a person or a specific entity, but it seems that Trend Micro experts have succeeded in tying a former …
Manage Linux and UNIX privileged access
BeyondTrust released PowerBroker Servers Enterprise which allows organizations to seamlessly manage privileged access on Linux and UNIX systems across dynamic physical, …
Potential first Android bootkit spotted
Security researchers of US-based NQ Mobile have recently discovered what might be the first Android bootkit. Dubbed DKFBootKit, the malware piggybacks malicious payloads into …
1.5 million cards compromised in Global Payments breach
A massive breach of the processing system of Atlanta-based Global Payments has been confirmed by the company. “The company believes that the affected portion of its …
Cloud computing trends that will affect cloud strategy
Continual monitoring of cloud computing trends, with regular updates to the enterprise’s cloud strategy, will be essential to avoid costly mistakes or miss market …
Deconstructing local and remote file inclusion attack vectors
Imperva released its latest Hacker Intelligence Initiative report exploring how Local and Remote File Inclusion (RFI/LFI) attacks enable hackers to execute malicious code and …
Learning iOS Programming, 2nd Edition
Get a rapid introduction to iPhone, iPad, and iPod touch programming. With this easy-to-follow guide, you’ll learn the steps necessary for developing your first …
Week in review: Massive Zeus C&C servers seizure, Android security, and the challenges of being a CISO
Here’s an overview of some of last week’s most interesting news, reviews, podcasts, interviews and articles: Microsoft disrupts massive cybercrime operation In its …
Six ways to improve SCADA security
Industrial control systems (ICS), distributed control systems (DCS), supervisory control and data acquisition systems (SCADA) have all been around for decades, but thanks to …
Targeted domain controller attacks increase 150%
Bit9 has seen a 150 percent increase in the number of attacks on domain controllers year-over-year. Attackers, largely nation states and cyber criminals, are targeting …
Ad-Aware 10 released
Lavasoft released Ad-Aware 10, a complete redesign of its free anti-malware software. With a new interface, the software package has been completely re-written from the ground …
Featured news
Resources
Don't miss
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites
- Black Friday 2025 for InfoSec: How to spot real value and avoid the noise