A phishing e-mail to learn from
A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …
A Guide to Kernel Exploitation
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers …
The importance of e-mail security
E-mail is exposed at various points along its transmission, via backups, by IT staff members, or during firewall inspection. And not just the text: attachments account for …
Facebook privacy changes – a missed opportunity?
Facebook announced yesterday that changes are coming soon to the Facebook interface, in particular to the ‘Groups’ system. According to CEO Mark Zuckerberg, …
The threat behind fake LinkedIn messages
Retarus sent out a warning in response to a current wave of fake contact requests via the social media platform LinkedIn. These well-simulated e-mail messages present a …
Guide helps enterprises design and implement key controls
Recent international regulations have placed the need for monitoring internal controls at the top of the boardroom agenda. Having controls in place is a basic business …
High expectations for personal information protection
According to a recent survey by ING, nine in 10 adults agree that financial services companies should be doing more to protect their customers’ personal and financial …
Navigation and fingerprint authentication device
AuthenTec unveiled today the world’s smallest fingerprint sensor for combining authentication and navigation functions in one device, the AES850. This low profile sensor …
Web-voting option suspended due to a system flaw
The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …
Politically motivated cyber attacks
According to a new report, 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber …
Alleged leader of carding gang arrested
A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …
Security updates for Adobe Reader and Acrobat
Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for …
Featured news
Resources
Don't miss
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”
- Python Foundation rejects US government grant earmarked for security improvements
- AI agents can leak company data through simple web searches
- Early reporting helps credit unions stop fraudulent transfers faster