So, you want to be a security pro? Read this first
Of all the high-demand areas in IT, security stands out at the top.According to DICE, the number of security jobs skyrocketed by more than 40 percent from 2014 to 2015, to 50,000 openings, compared...
View ArticleDevice Management presents barrier to IoT at scale
Industry survey highlights key to delivering ambitious growth expectations for connected devices4 April 2016: Management of thousands or millions of internet connected devices is posing a major...
View ArticleTo dodge crypto, undercover UK cops simply asked to see terror convict’s iPhone
CNNKey evidence that helped convict two British men last week for terrorist offences was reportedly obtained from a locked phone using a simple but highly effective ruse. According to CNN, which cited...
View ArticleTop Silk Road 2.0 admin “DoctorClu” pleads guilty, could face 8 years in prison
Judit Klein Last week, a federal judge in Washington formally accepted the guilty plea of Brian Farrell, the 28-year-old who had been accused in 2015 of being the right-hand man to the head of Silk...
View ArticleEA trumps Trump ad, takes down supporter’s retweeted Mass Effect video
I probably could have made this up if I tried, but you wouldn't believe it if I did.Trump Effect In a US presidential campaign season full of unexpected moments and petty squabbles between candidates...
View ArticleBBM App Security Features Now Free
A new update gives Android, iOS, and BlackBerry device owners unlimited access to Retract and Timer. BlackBerry has dropped its $1-per-month subscription plans for some key BBM privacy features. A new...
View ArticleOpen Network Insight Project Builds on Big Data to Improve Security
The open-source effort, which is backed by Cloudera, Intel, eBay and others, is seeing early adoption, as organizations aim to gain the upper hand on attackers. Using big data to collect network events...
View ArticleTSA spent $47,000 on an app that just randomly picks lanes for passengers
According to Mashable, the Transportation Security Administration apparently spent $47,000 on an app that is essentially a random number generator—it was briefly used to assign travelers to left or...
View ArticleGeorge Bush naked selfie hacker Guccifer gets his day in US court
Romanian taxi driver embarrasses the rich and famous Marcel Lehel Lazăr, 44, who as the hacker Guccifer published the email account contents of senior US political figures, has appeared for the first...
View ArticleMassive Law Firm Hack Reveals Rich Hiding Money
Hackers allegedly stole more than 11.5 million documents from the Panamanian law firm of Mossack Fonseca, detailing the workings of offshore accounts for many politicians and the rich, and delivered...
View ArticleHackers demo persistent, quiet attacks through Windows DSC
Desired State Configuration tool can create state of chaos AUDIO from Black Hat Asia Forensics men Matt Hastings and Ryan Kazanciyan have flipped the Windows Desired State Configuration (DSC) into a...
View ArticleUltracomms Achieves Payment Card Industry Data Security Standard (PCI DSS)...
Fareham, Hants, UK – 5 April, 2016 – Ultracomms, Europe’s first cloud contact centre services provider, today announced that it has been certified as compliant with the Payment Card Industry Data...
View ArticleDigital certificates are helping deliver malware
Digital certificates and malware go together like peanut butter and petroleum jelly -- they can be sandwiched together easily, but the result is not exactly tasty or good for you. As you may know,...
View ArticleSurprise! Magic Kinder app could let hackers send vids to your kids
Infosec bods look at app, discover huge vulnerabilities Security watchers have warned of massive privacy problems with the Magic Kinder App for children. A lack of encryption within the Magic Kinder...
View ArticlePreservica joins the Information Governance Initiative to support...
Digital Preservation specialist partners with industry-leading think tank to conduct new research on the protection of digital informationPreservica, the digital preservation specialist, has become a...
View ArticleHow to Spot and Avoid Credit Card Skimmers
The moment I started seriously worrying about credit card and debit card skimmers wasn't when my entire bank account was transferred to Turkey, or when I had to get three credit cards in two months...
View ArticleWhatsApp is now most widely used end-to-end crypto tool on the planet
samazgor WhatsApp has enabled end-to-end encryption across all versions of its messaging and voice calling software, according to a Tuesday announcement on the company's website. Given that WhatsApp is...
View ArticleVeriflow Brings 'Formal Verification' to Network Security
Startup Veriflow, newly emerged from stealth mode, aims to help limit security risks by mathematically verifying the integrity of networks. Before NASA launches a spacecraft or Intel puts a new chip...
View ArticleAndroid Bug Fixes Roll Out to Nexus Devices
The fix fixes a slew of bugs, including one related to a media framework that caused Stagefright issues to return. Google's monthly Android patch is one you might want to keep an eye on. The fix takes...
View ArticleNoScript and other popular Firefox add-ons open millions to new attack
EnlargeNoScript, Firebug, and other popular Firefox add-on extensions are opening millions of end users to a new type of attack that can surreptitiously execute malicious code and steal sensitive data,...
View Article