Ghost in the Wires
Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …
The sorry state of web-based single sign-on services
Web-based single sign-on services are becoming increasingly popular, as they offer a better and simpler user experience. But are they secure? The question was asked by team of …
Data breach vulnerabilities in the workplace
Many business professionals don’t realize that when their company’s confidential information is at risk, so too is the information of its clients, vendors, …
LockPath and Qualys partner on risk intelligence
LockPath, a provider of GRC applications, and Qualys, a provider of cloud information security and compliance management solutions, announced an integration partnership to …
Voice analysis technology prevents phone scams
Nagoya University and Fujitsu developed the first technology to analyze phone conversations to automatically detect situations in which one party might “over …
Top U.S. cities for phone loss
The findings from a phone loss study revealed that lost phones, if unrecovered, could cost U.S. consumers more than $30 billion this year. The analysis, from more than 15 …
Mozilla testing default Google search encryption in Firefox
Firefox users should soon have encryption turned on by default when searching for things online via the built-in Google search engine, Mozilla confirmed. The change has been …
Top cause of data breaches? Negligent insiders
Negligent insiders are the top cause of data breaches while malicious attacks are 25 percent more costly than other types, according to the Ponemon Institute. The study also …
Surge in mobile exploits and shell command injection attacks
IBM released the results of its X-Force 2011 Trend and Risk Report which shows surprising improvements in several areas of Internet security such as a reduction in application …
Video surveillance on Cisco Unified Computing System
Cisco announced that its Video Surveillance software is available on the Unified Computing System (Cisco UCS) platform, now in use by more than 11,000 customers. Cisco …
A peek in the world of vulnerability sellers
As you probably already know, this year’s edition of Pwn2Own wasn’t the only hacking contest at the CanSecWest conference held earlier this month. Pwn2Own rules …
Georbot information stealing Trojan uncovered
ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)