Please turn on your JavaScript for this page to function normally.
China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

The importance of data normalization in IPS

To fully comprehend the importance of data normalization in an Intrusion Prevention System, it is first necessary to understand what data normalization is and what it does, …

Google alerts users about new state-sponsored attacks

Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …

White House Military Office breached by Chinese hackers

Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …

Chimera: A declarative language for streaming network traffic analysis

Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …

Open source NAC system PacketFence 3.5 released

PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …

Do you need a honeypot?

It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …

Best Buy warning users of account compromise?

Best Buy has apparently been deactivating some of its users’ accounts and notifying the owners about it via email. “We are currently investigating increased …

Open source IDS Suricata 1.3 released

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …

Real-time alert system shows active cyber attacks in 3D

A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the …

A basic shift in network defense

“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …

How to spot automated Web application attacks

Imperva released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. As much as 98 percent of …

Don't miss

Cybersecurity news