Dynamic worm wreaks havoc
A rather industrious worm has been detected by Trend Micro threat analysts, and it usually infects users who have been careless enough to click on a link offered in a variety …
Rogue employees sell passport data of World Cup fans
Reports are coming in that the Information Commissioner’s Office has started investigating FIFA, the world football governing body, over allegations that details of …
Incentives and challenges for cyber security information sharing
The European Network and Information Security Agency (ENISA), launched a new report on barriers to and incentives for cyber security information sharing. It shows that the …
Hotel systems breached and card info stolen all over the U.S.
The payment system at a number of properties of HEI Hospitality – the hospitality operator that runs over 30 upscale hotels across the U.S. under brand names as …
Be careful what you reveal online
In the video below, Trend Micro CTO Raimund Genes discusses how an attacker can use information from social networks such as LinkedIn and Facebook to hack into a corporate network.
Audit reveals gaping security holes on DHS networks
The recently released results of a security audit performed on the various systems used by the US-CERT to accomplish its cybersecurity mission revealed an unpleasant reality: …
PayPal fails to follow its own anti-phishing advice
PayPal credentials are one of the most sought after by phishers, so it stands to reason that the company would try to educate its users on Internet safety. And it does – …
Critical 0-day Adobe Acrobat, Reader flaw exploited in the wild
Adobe has released a security advisory warning users about a newly discovered 0-day vulnerability that has already been spotted getting exploited in the wild. The flaw affects …
Multiple vulnerabilities in Cisco Wireless LAN Controllers
Cisco WLCs and Cisco WiSMs are responsible for system-wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service, and …
Scammers target aspiring games beta testers
Scammers purportedly looking for beta testers for computer games have lately stepped up their efforts, says Sunbelt‘s Christopher Boyd. He has observed two distinct …
How your identity could be stolen on Facebook
With its millions of users, the world’s most popular social network has become a perfect target for attackers exploiting such a dense concentration of potential victims. …
Tips for safer social networking
The popularity of social networking sites such as Facebook, Twitter and LinkedIn is continuing to grow dramatically, but not just with users. Cybercriminals increasingly are …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform