Malware redirects bank phone calls to attackers
Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …
Detecting the DNS Changer malware
January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …
(IN)SECURE Magazine issue 33 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 33 has been released today. Table of contents: …
Romanian hacker TinKode allegedly arrested
A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Fake Tumblr Staff Blog offers still targeting users
A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …
Sophos wireless access point supports 5 GHz connections
Sophos announced the Astaro AP50, its new dual-band/dual-radio capable wireless access point. The new addition to Astaro’s wireless access point family supports both …
The Tangled Web: A Guide to Securing Modern Web Applications
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application …
Counterclank: Info-stealing Trojan or advertising tool?
A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …
Law firms get hacked for deal data
A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
Greatest risks to database security
The greatest challenge to database security may actually come from organizational issues, rather than nefarious or accidental acts, according to a survey presented by …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices