SMS spying Android Trojan triggered by keywords
Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …
Anonymous dumps US law enforcement, Brazil’s Federal Police data, hacks Syrian MOD website
It has been another busy weekend for the AntiSec initiative. First Anonymous and LulzSec released a 10GB data dump consisting of the information pilfered from the servers of …
Annual cost of cybercrime highlights need for governance
ISACA commends the Ponemon Institute’s latest “Cost of cybercrime” report for the detail it provides on the indirect costs of IT security attacks, as well as …
“Fidel Castro died” spam run leads to malware
Malware pushers have never balked from using news about a celebrity’s death to trick people into downloading malicious payloads. They also have no problem with faking …
The privacy officer’s agenda according to Gartner
Data breaches, cloud computing, location-based services and regulatory changes will force virtually all organizations to review, and at least half of all organizations to also …
Assessing the security of cloud providers
The Cloud Security Alliance announced the launch of a new initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & …
Week in review: Mobile drive-bys, Facebook bug bounty and Operation Shady RAT
Here’s an overview of some of last week’s most interesting news and articles: Facebook introduces bug bounty program Facebook has decided to follow in …
Was your company one of the targets of Operation Shady RAT?
“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know,” …
July 2011 threat landscape
July has been a hot month for SEO poisoning, and its popularity is expected to continue in August, says GFI. Users to be cautious of likely search term targets for scammers, …
Drive-by attacks targeting smartphones are in our future
A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …
Spam king facing criminal charges for Facebook spamming
Sanford “Spamford” Wallace has long been a thorn in the side of social networks and has already been successfully sued in civil court by the FCC, MySpace and …
Hacktivists are “villains”, say IT security pros
The majority of IT security professionals have – unsurprisingly – a negative opinion of “hacktivists”, say the results of a survey of 211 attendees at …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground