Hackers steal, publish Fox employee passwords
A group of attackers who clearly have it in for Fox Broadcasting have managed to access a company server with hundreds of their employees’ email usernames and passwords. …
Obama administration reveals cybersecurity plan
The Obama administration has issued a new legislative proposal that contains a number of steps it thinks critical to improving cybersecurity for U.S. citizens, the …
First mobile wireless storage for iOS
Seagate announced GoFlex Satellite mobile wireless storage, the first battery-powered external hard drive to wirelessly extend the storage capacity of any Wi-Fi enabled mobile …
PC Lock protects from identity theft, privacy invasion
Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …
PSN attackers allegedly used Amazon cloud for attack
Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …
Unattended Linux VM configuration tool for Hyper-V
Set-LinuxVM is a tool provided as a Windows PowerShell module which is able to create Linux Virtual Machines on a Hyper-V host. It supports Debian, Ubuntu, CentOS, Fedora, …
Five ways to migrate applications to the cloud
Organizations seeking to move applications into the cloud have five options: rehost on infrastructure as a service (IaaS), refactor for platform as a service (PaaS), revise …
Chromebook: A new class of risks
We are certainly living in interesting times. It was less than a week ago that a rumor appeared that Apple is going to switch to ARM processors for its next generation of …
The rise of rogue AV
April saw a continued increase in the volume of detected malware, with 73,000 new variants of threats being released daily – a 26 percent increase over the same period …
Automated solution for patching software vulnerabilities
A universal law enforcement axiom states that criminals prefer to trespass through vulnerable open or unlocked doors or windows. In the IT and software industries, the same …
Free check verification and validation of bank accounts
Recent Federal Trade Commission activity is undeniable evidence for increased concern of the public in connection with unauthorized check creation and fraud conducted by …
Week in review: Leaking Facebook apps, Chrome sandbox cracked and explosion of Android malware
Here’s an overview of some of last week’s most interesting news, interviews, videos and articles: Files uploaded to file hosting services accessed by malicious …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)