Government telecommunication-spying malware opens backdoor
The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …
Most social networks users don’t keep up with privacy settings changes
The proliferation and usage of mobile devices is exponentially growing, as is consumers’ dependence on the Web, causing many to lose sight of the importance of keeping …
Week in review: Patching strategies, HTC Android privacy flaw, and how well do you know SSL?
Here’s an overview of some of last week’s most interesting news, videos, articles and podcasts: Serious disconnect between security perceptions and reality The …
Top DDoS attacks of 2011
There has been an increase in newer, intelligent application-layer DDoS attacks that are extremely difficult to identify “in the cloud,” and often go undetected …
MagicTree: Data management for penetration testers
Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host …
Most trusted source for security training comes to London
In the last 12 months, we have seen a marked rise in hacktivism, financially motivated crime, and potentially state-sponsored cyber attacks. The range of targets has also …
Cloud-based anti-phishing software platform
FraudSense announced a public demo featuring its proprietary real-time anti-phishing detection algorithms. FraudSense identifies and disables fraudulent websites in real-time. …
Facebook scammers exploit death of Steve Jobs
PandaLabs detected a malicious link on Facebook that was being used to exploit the news of the death of Apple co-founder Steve Jobs. Just a few hours after Steve Jobs’ …
The state of hacked accounts
Most users get hacked at high rates even when they do not think they are engaging in risky behavior, with 62% unaware of how their accounts had been compromised, according to …
ExploitHub offers cash for exploits
ExploitHub, the marketplace for penetration testers, is issuing a bounty for exploits developed against 12 high-value vulnerabilities (CVEs). Security researchers who submit …
Malware attacks up due to social media
63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …
Oracle Public Cloud released
Oracle CEO Larry Ellison announced the Oracle Public Cloud, a set of integrated services that provide customers with subscription-based, self-service access to Oracle Fusion …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help