Virus downs Australian ambulance dispatch service
The dispatch system of the Ambulance Service of New South Wales – the Australian most populous state – has been downed on Saturday by an unspecified virus. The …
Companies sever ties with HBGary
The HBGary breach and the publication of internal company documents – including the potentially damning proposal developed by HBGary, Palantir Technologies and Berico …
Hardware security modules for cryptographic protection
Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …
SMS Trojan masquerading as valentine-sending mobile application
It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …
Central management of self-encrypting hard drives
Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …
Week in review: HBGary breach, corporate espionage and 2-step authentication by Google
Here’s an overview of some of last week’s most interesting news and articles: Hackers compromised Nasdaq’s network Hackers continue to breach systems of …
Fake scanned documents lead to Zeus infection
A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
Nigerian scammers impersonate FBI agents
The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …
Chinese hackers behind espionage attacks hitting Western oil firms?
Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …
What Stuxnet means for the process industry
The Stuxnet and Aurora attacks have shown us that malware development has become a professional job. These threats targeting the process industry were written by highly …
2-step authentication finally available to Google’s non-paying customers
Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …
Featured news
Resources
Don't miss
- Browser-in-the-Browser phishing is on the rise: Here’s how to spot it
- Enterprise security faces a three-front war: cybercrime, AI misuse, and supply chains
- Rakuten Viber CISO/CTO on balancing encryption, abuse prevention, and platform resilience
- Turning cyber metrics into decisions leaders can act on
- Teaching cybersecurity by letting students break things