The U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) has notified Congress of “a major information security…
One of my favorite writers is Christopher Hitchens. I came to know him through his latest book on religion, titled…
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015 • …
Cybercriminals have devised a sophisticated scheme exploiting SourceForge, a popular software hosting platform, to distribute malicious software disguised as legitimate…
Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic, costing businesses millions. This type…
I need to address something that’s come up in the last couple of months regarding my treatment of religion here…
You will find a common pattern if you read blog posts or watch interviews with some of today’s top ethical…
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10…
Microsoft’s April 2025 Patch Tuesday updates are strangely creating an empty “inetpub” folder in the root of the C: drive, even on…
A plugin designed to patch security vulnerabilities in older versions of Shopware has itself been found vulnerable to SQL injection…
Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal underground, revealing the intricate web…
Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords Pierluigi Paganini April 09, 2025 Fortinet addressed a critical…









