Security  

  •  
  • By Eduard Kovacs
  • October 17th, 2013
Akamai Releases “State of the Internet” Report for Q2 2013

Akamai Releases “State of the Internet” Report for Q2 2013

The number of DDOS attacks has increased by 54% compared to Q1

  •  
  • By Eduard Kovacs
  • October 17th, 2013
PR Newswire Hacked, Possibly by Those Who Breached Adobe

PR Newswire Hacked, Possibly by Those Who Breached Adobe

Usernames and encrypted passwords were found on a server

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Defending Your Devices Against Cyberattacks – Infographic

Defending Your Devices Against Cyberattacks – Infographic

Multi-device solutions are the most efficient way to protect your devices

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Security App of the Week: Security Review for Drupal

Security App of the Week: Security Review for Drupal

The module checks for issues that could lead to vulnerable installations

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Watch Episode 3 of Trend Micro’s 2020

Watch Episode 3 of Trend Micro’s 2020

The new episode is called “We didn’t see it coming”

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Bogus Survey Bypasser Tool Leads to Surveys

Bogus Survey Bypasser Tool Leads to Surveys

You'll never win any prizes, no matter how many surveys you complete

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Chinese Hackers Use Bogus Limo Company Invoices to Target Mandiant CEO

Chinese Hackers Use Bogus Limo Company Invoices to Target Mandiant CEO

Kevin Mandia believes people linked to the hackers might have attended his presentations

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Android Users in China and Southeast Asia Targeted with Fraudware

Android Users in China and Southeast Asia Targeted with Fraudware

NQ Mobile initially spotted 193 infections across 9 countries

  •  
  • By Eduard Kovacs
  • October 16th, 2013
UK Postpones Launch of National CERT Until 2014

UK Postpones Launch of National CERT Until 2014

The government wants to do things right, which is why it's delaying the launch

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Hoax Alert: Too Many Usernames on Kik Messenger

Hoax Alert: Too Many Usernames on Kik Messenger

Another bogus chain message making the rounds online

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Researchers Identify Two Sandbox Escape Vulnerabilities in IBM SDK for Java 7.0

Researchers Identify Two Sandbox Escape Vulnerabilities in IBM SDK for Java 7.0

Security Explorations has sent information and POC code to IBM

  •  
  • By Eduard Kovacs
  • October 16th, 2013
BT, NCA and GCQH Team Up for Cyber Security Challenge UK

BT, NCA and GCQH Team Up for Cyber Security Challenge UK

The organizations are responsible for designing the 2014 Masterclass final

  •  
  • By Eduard Kovacs
  • October 16th, 2013
24th Annual Information Security Forum World Congress Announced

24th Annual Information Security Forum World Congress Announced

The event will take place in Paris on November 3-5

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Council of Europe to Launch Cybercrime Office in Romania

Council of Europe to Launch Cybercrime Office in Romania

The new office will allow the organization to respond faster to requests for support

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Oracle Patches 127 Vulnerabilities with October 2013 CPU, Including 51 Java Fixes

Oracle Patches 127 Vulnerabilities with October 2013 CPU, Including 51 Java Fixes

Researchers have published the technical details for one of the fixed Java issues

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Rapid7.com Hijacking: Theft of Employee Credentials, Not Faxed DNS Change Request

Rapid7.com Hijacking: Theft of Employee Credentials, Not Faxed DNS Change Request

Register.com continues to investigate the incident

  •  
  • By Eduard Kovacs
  • October 16th, 2013
Global Vessel Tracking Systems Vulnerable to Hacker Attacks, Experts Warn

Global Vessel Tracking Systems Vulnerable to Hacker Attacks, Experts Warn

Trend Micro researchers have demonstrated what an attacker can do

 
Want more? Browse: