Data center industry dynamics
While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …
Microsoft disrupts massive cybercrime operation
In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …
Free online tool teaches IT security procedures
AVG Technologies launched SMB BootCamp, a free, online tool to help SMBs demonstrate to customers that their company is seriously committed to following AVG’s …
Week in review: Facebook privacy loophole, Duqu still active, the world of vulnerability sellers
Here’s an overview of some of last week’s most interesting news, podcasts, videos and articles: US govt and military email addresses offered for sale Webroot has …
Facebook set to change its privacy policy again
On March 15, Facebook published a draft of the changes that it plans to make to its Statement of Rights and Responsibilities, and asked users to comment on them. Among the …
Flash-based rogue AV targets users
The business of pushing rogue AV software onto unsuspecting users is quite lucrative, so it’s no wonder that cyber crooks are still doing it. But while most of the time …
Megaupload users targeted with extortion scheme
The recent shutdown of the Megaupload file hosting service by the US authorities is being actively exploited by cyber crooks who are attempting to extort money from the …
Call center employees are selling user information
Indian call center employees sell confidential data belonging to users for as little as $0.03, reports the Daily Mail. According to the news outlet, reporters from The Sunday …
Plan to reduce botnets launched
More than one in ten U.S. computers are infected by difficult-to-detect bots, which botmasters can use for anything from sending spam, to eavesdropping on network traffic, to …
Ghost in the Wires
Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …
The sorry state of web-based single sign-on services
Web-based single sign-on services are becoming increasingly popular, as they offer a better and simpler user experience. But are they secure? The question was asked by team of …
Data breach vulnerabilities in the workplace
Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …
Featured news
Resources
Don't miss
- AI isn’t one system, and your threat model shouldn’t be either
- LLMs work better together in smart contract audits
- Product showcase: NAKIVO v11.1 advances MSP service delivery with secure multi-tenant management
- Crypto theft in 2025: North Korean hackers continue to dominate
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring