10 security predictions for 2011
WatchGuard Technologies’ security analysts provide their 2011 security predictions: 10. “APT” becomes security acronym of the year – Heard of …
Facebook apps now allowed to harvest users’ address and mobile phone number
The latest step that Facebook took in the long process of eroding our privacy expectations happened on Friday. The social network announced on their Developer Blog that from …
Week in review: “Facebook closing” hoax, spam trends and third-party software vulnerabilities
Here’s an overview of some of last week’s most interesting news, videos and articles: Spam moving to social networks and mobile While at the moment it is not …
Ransomware continues to pose a threat
The great majority of cybercriminals is in it for the money. Some choose to steal it indirectly by using information-stealing malware to gain access to users’ online …
Former TSA employee sentenced for hacking agency’s databases
A former TSA worker has been found guilty and has been sentenced to two years in prison and a $60,587.07 fine to be payed to the TSA. He was accused of tampering with the …
Gamers breached medical server to play Call of Duty
An office server on which the New Hampshire Seacoast Radiology had stored sensitive personal and medical information of more than 230,000 patients has been breached in …
Bogus airline charge leads to Zeus Trojan
A recent spam campaign is targeting frequent users of a popular German airline carrier, baiting them with a exorbitant bogus fee that has apparently been charged to their …
Safety advice to protect connected devices
If you were one of the millions of people who received tech gifts during the holidays, beware. Computer and cybercrimes have risen by more than 22% according to the most …
Data breach notifications in Europe
Recent high profile incidents of personal data loss in Europe have prompted wide discussion about the level of security applied to personal information shared, processed, …
Adobe changes Flash Player feature to prevent user tracking
In the last few years, Adobe has realized that their products will have no future if they don’t step up the security aspect, and so they started doing things like …
Waledac botnet wakes up after 7 days of sleep
Waledac appeared in a new version in the last days of 2010, sending out big amounts of New Year related spam messages. It then stopped spamming in the evening of January 4th, …
REMnux: Linux distribution for reverse-engineering malware
REMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software. REMnux is designed for running services that are useful to …
Featured news
Resources
Don't miss
- Cloud-audit: Fast, open-source AWS security scanner
- Zero trust, zero buzzwords: Here’s what it means
- HR, recruiters targeted in year-long malware campaign
- Attackers use AiTM phishing kit, typosquatted domains to hijack AWS accounts
- Airbus CSO on supply chain blind spots, space threats, and the limits of AI red-teaming