Slovenian Mariposa suspects’ identities revealed
A month has passed since the Mariposa malware author was arrested in Slovenia, and more details about the case have surfaced in the meantime. The Slovenian police says that …
Customer information of drugstore chain exposed
Personal information of 150,000 online customers of the German drugstore chain Schlecker was available online for everyone to access due to an error of the chain’s …
(IN)SECURE Magazine issue 27 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 27 has been released today. Table of contents …
Fake TwitterDeck update infects Twitter users
The recent announcement made by Twitter regarding the switch from basic access authentication to OAuth open protocol on the Twitter API proved to be a godsend to malware …
30 days of 0-days, binary analysis and PoCs
An independent group of security researchers that goes by the name of Abysssec Security Team has announced some two weeks ago its intention of making September a month of …
Cloud security certification from the Cloud Security Alliance
The Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) is now open for testing. The industry’s first user certification program for secure …
QualysGuard PCI 5.0 released
Qualys announced QualysGuard PCI 5.0, giving customers a simplified way to meet the latest PCI DSS compliance requirements. It includes updates following new Approved Scanning …
Top scams on the web
PandaLabs has drawn up a ranking of the most widely used scams over the last few years. These confidence tricks, which are still in wide circulation, all have the same …
Malware protection tips for social media users
Facebook, Twitter, MySpace, LinkedIn… the list of social media sites people use almost daily seems to grow exponentially. Although these places may be bastions of free …
Trend Micro announces Deep Security 7.5
Trend Micro announced the latest version of its security software that protects operating systems, applications and data on physical, virtual and cloud servers, and virtual …
Email still the top source of data loss
Email continues to be the number one source of data loss risks in large enterprises as more than a third (35 percent) investigated a leak of confidential or proprietary …
New virtual security gateway simplifies cloud security
Check Point announced the new Security Gateway Virtual Edition (VE) with VMsafe integration that secures the cloud with a firewall and protects dynamic virtual environments …
Featured news
Sponsored
Don't miss
- Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
- Chinese hackers compromised an ISP to deliver malicious software updates
- The role of AI in cybersecurity operations
- How to start your cybersecurity career: Expert tips and guidance
- MISP: Open-source threat intelligence and sharing platform