McDonald’s data breach just the tip of the iceberg
A couple of days ago, the database containing the names, mobile phone numbers, and postal addresses and/or e-mail addresses of McDonald’s customers was discovered to …
FBI put backdoors in OpenBSD IPSEC stack?
Some serious allegations have been raised yesterday as Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has made public a private e-mail he received from …
Insiders are most often responsible for data loss
IT managers see insider threat as the biggest danger when it came to data loss within corporate networks (54 percent), according to a survey by Imperva. Far fewer respondents …
Database breach that could endanger lives
A database breach that could result in more than just identity theft is the result of a compromise of the online database of the Mesa County Sheriff’s Department …
Microsoft November Patch Tuesday bottom line
In the video below, Qualys CTO Wolfgang Kandek and Qualys vulnerability labs manager Amol Sarwate discusses this month’s Microsoft Patch Tuesday release. To learn more …
Lack of awareness for PCI DSS 2.0
New research by LogLogic has indicated that 13.8 percent of respondents are completely unaware of the new version and 15.5 percent confirm they are only partially aware of it. …
Microsoft patches record 40 vulnerabilities
Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Fake Hallmark greeting card carries malware
A spam campaign consisting of e-mails posing as Hallmark Christmas cards and containing a malicious attachment has been detected by MX Lab researchers: Coming from a spoofed …
Julian Assange granted bail
WikiLeaks founder and director Julian Assange has been granted bail and will likely be freed in the next few days – as soon as the £240,000 in security are raised …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Top wireless security trends for 2011
Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility