Cybercriminals focus on targeted attacks
When it comes to computer security, bad news usually follows even the rare positive statistic. In their latest report, Websense note that they’ve seen the number of …
Microsoft plans massive Windows patch next week
Microsoft announced it will deliver 13 bulletins Tuesday, February 9, 2010. They will address 26 vulnerabilities in Windows and Office, five of which are rated critical. The …
Google and NSA team up to fend off future attacks
Google and the NSA reached an agreement that will see the security agency helping with the investigation of the latest attack of the Internet giant that supposedly carried out …
NIST draft of smart grid cyber security strategy
The Commerce Department’s National Institute of Standards and Technology (NIST) issued the second draft of its Smart Grid Cyber Security Strategy and Requirements, which …
Windows file system exploitation at ShmooCon
At ShmooCon 2010 tomorrow, Core Security researcher Dan Crowley will demonstrate how features not widely known in Windows path and filename normalization routines cause …
Police push for fast access to ISP data
According to the answers given by a 100 police investigators, they are not very satisfied with the speed with which they are able to access company documents during …
Hackers make millions through stolen carbon credits
Anything worth anything is worth something to somebody. And carbon credits are not just something small – these days, they’re worth millions. It is no wonder, …
Life of a Chinese hacker
Majia is in his early twenties, and is a college graduate with a degree in engineering. During the day, he works at a government agency. But at night, he is free to follow his …
Cracking encrypted iPhone backups
iTunes routinely makes backups of iPhones and iPods being synced to it. Such backups contain a plethora of information, essentially all user-generated data from the device in …
Keeping World of Warcraft accounts safe
Blizzard Entertainment is taking seriously the string of account hijacking that had as a target its World of Warcraft users in the last few years. It is only normal, since the …
Top 10 malware threats for January
Sunbelt Software announced the top 10 most prevalent malware threats of January 2010. The top seven detections were the same as December, but in a slightly different order. In …
Off-Twitter phishing attack explained
The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?