The Latest News

  • In Britain, Malware No. 1 Cyberthreat

    Zeus Banking Trojan Threats Still Dominate, CERT-UK Warns In Britain, Malware No. 1 Cyberthreat

    Britain's computer emergency response team - CERT-UK - reports that malware remains the dominant mode of online attack for cybercriminals, and Zeus their most preferred tool of choice. But the team is promoting a free information-alert service to help. Read more...

  • Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond Read more...

  • Massive 'Logjam' Flaw Discovered

    Report: NSA Likely Exploited Flaw to Crack VPNs Massive 'Logjam' Flaw Discovered

    Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn. Read more...

  • Router Hacks: Who's Responsible?

    40,000 Exploited Devices Show 'Internet of Things' Risks Router Hacks: Who's Responsible?

    An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down? Read more...

  • UK Quietly Rewrote Hacking Law

    Prosecution Exemption Now Applies to Police, Spies UK Quietly Rewrote Hacking Law

    The British government rewrote the country's computer abuse law in March to shield law enforcement and intelligence agencies from being prosecuted for hacking. The move, which just came to light, appears to have been driven by a legal claim. Read more...

  • Article

    Dating Website Breach Spills Secrets

    Darknet Dump Offers 3.9 Million Users' Personal Details By Mathew J. Schwartz
    Dating Website Breach Spills Secrets

    One of the world's largest dating websites - self-described "thriving sex community" AdultFriendFinder.com - is investigating reports of a data leak containing details of 3.9 million users' personal details and sexual preferences.

  • Article

    NetUSB Flaw Affects Router Makers

    'Millions' of Devices May Be at Risk, Researchers Warn By Mathew J. Schwartz
    NetUSB Flaw Affects Router Makers

    "Millions" of devices from numerous router manufacturers appear to use a third-party software component called NetUSB, which can be exploited to bypass authentication checks and remotely take control of the devices, security researchers warn.

  • Article

    Feds Charge Chinese with Insider Theft

    DoJ: Secrets from U.S. Firms Used to Start Up a Chinese Venture By Eric Chabrow
    Feds Charge Chinese with Insider Theft

    Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.

  • Article

    Questions Over Plane Hacking Report

    Did FBI Conflate Virtual Hacks With Actual Exploits? By Mathew J. Schwartz
    Questions Over Plane Hacking Report

    Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?

  • Article

    Google App Engine Flaws Described

    Bug Hunter Outlines Discoveries in Java Version By Mathew J. Schwartz
    Google App Engine Flaws Described

    Veteran Java bug hunter Adam Gowdiak has disclosed details of what he says are unpatched flaws in Google App Engine for Java and criticized the company for its response.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    2014 Faces of Fraud

    Fraud Summit - San Francisco 2014 - As the Target and Neiman Marcus incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking...

  • 2014 Advanced Persistent Threats Survey Results

    Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats....

More webinars...

White Papers

More whitepapers...
ARTICLE CISOs Frustrated by External Threats

Driven by the spectre of external threats, attacks and growing business expectations, can CISOs...

Latest Tweets and Mentions

ARTICLE CISOs Frustrated by External Threats

Driven by the spectre of external threats, attacks and growing business expectations, can CISOs...

The ISMG Network