Please turn on your JavaScript for this page to function normally.
Digital Government Strategy progress and challenges

A new report by Mobile Work Exchange and Good Technology examines Federal agencies’ progress toward the Office of Management and Budget’s (OMB) Digital Government …

Over 45% of IT pros snitch on their colleagues

Forty five percent of IT workers admit they would snitch you up to the boss if you decide to break corporate rules or access company information that you shouldn’t on …

Large cyber espionage emanating from India

Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …

Barracuda updates web application firewall

Barracuda Networks announced Barracuda Web Application Firewall 7.8, specifically aimed at reducing the impact of automated attack attempts from botnets. Automated botnet …

Week in review: Human sensors, IT security jobs, and hacking car charge stations

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Police unable to decrypt iPhones, asks Apple to do it Court …

Targeted data stealing attacks using fake attachments

ESET has uncovered and analyzed a targeted campaign that tries to steal sensitive information from different organizations, particularly in Pakistan (with limited spread …

A look into the EC Council hack

Update: Wednesday, 22 May 2013 – Tal Be’ery: “We had analyzed a screenshot of what we had thought at the time the current EC council site hack. Later we had …

Application vulnerabilities still a top security concern

Respondents to a new (ISC)2 study identified application vulnerabilities as their top security concern. A significant gap persists between software developers’ …

Intelligent vulnerability management from CORE Security

CORE Security launched Insight 3.0, which delivers multi-vector vulnerability assessment, asset categorization, threat simulation, penetration testing and security analytics, …

Mobile crimeware and the global criminal marketplace

The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisticated criminal technical innovation …

Internet scams that dominated in 2012

The Internet Crime Complaint Center (IC3) released the 2012 Internet Crime Report – a summary of reported fraudulent activity in the past year. In 2012, the IC3 received …

Tips for validating DDoS defenses

Prolexic has issued a number of recommendations that organizations can use to validate their DDoS defenses, as well as protection services they receive from mitigation …

Don't miss

Cybersecurity news