Latest Internet Explorer Zero-Day Used Against Taiwan Targets

Last week, Microsoft published some details regarding a new zero-day vulnerability affecting Internet Explorer that was being used in targeted attacks against Japanese targets as Fireeye published last week.
US senators introduce bill to stop “aggressive” NSA surveillance

Extensive National Security Agency (NSA) surveillance has led four US senators to introduce the Intelligence Oversight and Surveillance Act, a reform initiative designed to maintain privacy without impeding security.
Cybercriminals exploit most news within 22 hours

Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are inventing “breaking news” that appears to relate to high-profile current events.
Google’s Gmail Keyword Scanning Might Violate Wiretap Law, Judge Finds

A federal judge today found that Google may have breached federal and California wiretapping laws for machine-scanning Gmail messages as part of its business model to create user profiles and provide targeted advertising.
Silk Road Is the eBay of the Online Drug Trade

Drugs still may not be legal, but buyers can find an online community vetting and rating dealers and their product. Winston Ross talks to the founder of Silk Road, the go-to site for the ‘good stuff.’
Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY

This October, developers from around the globe have an opportunity to showcase their coding skills to an international audience at the HackWEEKDAY hackathon in Kuala Lumpur.
Hack of major data brokers weakens bank authentication

The reported hack of major consumer and business data aggregators has intensified doubts of the reliability of knowledge-based authentication widely used in the financial services industry, analysts say.
A Phisher of Men: Learn How to Turn Social Engineering Techniques Around to Improve Your Security at the RANT Forum

The dangers of phishing and social-engineering attacks are well known and understood by businesses, NGOs and public bodies, so why are they still effective?
Yahoo! Recycled Email Addresses

In response to the news that Yahoo! is recycling old email addresses, which is providing new users with old user’s confidential information
Social Networks are the new battleground of the cyber-activist

Panda Security, The Cloud Security Company, has just published the results of its Quarterly Report for Q2 2013, drawn up by PandaLabs