Cisco Mid-Year Security Report: Bad Guys Getting Badder
Enterprises making security improvements, but without integrated threat defenses, the hackers are still two jumps ahead. While the enterprise and personal data security vendor communities are making...
View ArticleKremlin-backed hackers used Twitter to breach US government systems
FireEye claims Russian hackers are using Twitter to steal data in almost 'undetectable' attacks
View ArticleIONU Launches Data-Centric Security Platform
The company’s data-centric platform protects sensitive data residing on or traveling to and from mobile devices within and outside of the firewall. IONU announced the launch of its data-centric...
View ArticleFacebook Intros New Tool for Keeping Its Users Secure
Adding to its security arsenal, Facebook launched Security Checkup, which provides account login status, login alerts and password safety features. Facebook, continuing its efforts to help keep users...
View ArticleResearchers Use Malware to Transmit Data Between Air-Gapped Computers
By infecting a computer and a phone, researchers were able to transmit data between the two systems without any sort of network connection. Disconnecting a computer from all networks is no longer a...
View ArticleVendors Finding Value in Bug Bounty Programs
A Bugcrowd report that examines 30 months of bug bounty submissions across 166 programs finds crowdsourced bug discovery is gaining adoption across the industry. Casey Ellis started Bugcrowd in 2012...
View ArticleBT Signs Contract With Ark Data Centres
Corsham, Wiltshire - 31 July 2015 - BT has selected Ark Data Centres Limited as a new UK data centre supplier and is adding Ark’s sites in the south of England to its BT Compute portfolio to meet the...
View ArticleoneM2M Advances Worldwide Interoperability Agenda through Plans for...
Sophia Antipolis, France, 31 July 2015. At their 18th Technical Plenary meeting held in Philadelphia, PA, on 20-24 July, oneM2M's members agreed on plans for the second release of oneM2M specifications...
View ArticleSeven Highly Anticipated Talks at Black Hat, DefCon Events
The Black Hat USA 2015 and DefCon 23 security conferences in Las Vegas from Aug. 4 to Aug. 9 will tackle an unmatched range of topics and some excitement—and concern—over the technologies shown to be...
View ArticleHacking Team Leak Could Lead to Policies Curtailing Security Research
While the disclosure of Hacking Team's marketing of zero-day flaws has roiled the security community, the reaction of policy makers could have a lasting impact on legitimate security research. The...
View ArticleSatellite Hacking Can Wreak Havoc, Black Hat Talk to Demonstrate
A researcher is set to detail how satellite tracking can be hacked, enabling misdirection of assets and theft. Satellite tracking systems are used for myriad activities, including monitoring the...
View ArticleWandera partners with Three to provide mobile data security and optimization
New partnership extends Wandera’s Secure Mobile Gateway to Three’s business customers in IrelandLondon and Ireland, 3rd August 2015 – Wandera, provider of advanced mobile threat prevention and data...
View ArticleRIG 3.0 Exploit Kit Infects Millions, Most Notably Adobe Flash Users
Trustwave researchers infiltrate the exploit kit's infrastructure and find a high success rate for Flash exploits. The RIG exploit kit is undergoing an evolution to version 3.0 as malware authors seek...
View ArticleIBM, RIT Team on Cyber-Security Training
IBM extended its ongoing relationship with the Rochester Institute of Technology by partnering on a program to advance cyber-security education. IBM and the Rochester Institute of Technology (RIT)...
View ArticleUL Labs Examining Wearables Security Concerns
With the rising use of wearable devices, Underwriters Laboratories is working to establish a cyber-security framework to help protect the devices. As more personal digital wearable devices are bought...
View ArticleQ&A With Black Hat, DEF CON Founder Jeff Moss
In-demand consultant and former hacker offers his takes on trends, privacy, machine learning -- and why you should always keep your keys in your pocket. The Black Hat professional security conference...
View ArticleResearchers demonstrate firmware attack targeting Macs
Security researchers to demonstrate undetectable 'Thunderstrike 2' attack against Apple firmware
View ArticleBGP Security Is in Black Hat’s Cross Hairs
Border Gateway Protocol risks are being explored at the Black Hat USA security conference, with new tools set to debut to improve security and detection of BGP security events. The Border Gateway...
View ArticleBug Bounty Programs Paying Off for Vendors, Security Researchers
Organizations have a number of methods at their disposal that they can use in their effort to improve security, one of them being to institute a bug bounty program. Bug bounty programs incentivize...
View ArticleChinese VPN Provider Using Malware to Expand Network
A purveyor of virtual private networks sold under multiple brand names uses malicious code to infect servers and turn them into nodes in its infrastructure, according to RSA. A Chinese virtual private...
View Article