intrusion detection
China-based hackers infiltrated New York Times’ network
The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …
The importance of data normalization in IPS
To fully comprehend the importance of data normalization in an Intrusion Prevention System, it is first necessary to understand what data normalization is and what it does, …
Google alerts users about new state-sponsored attacks
Remember when in June Google announced its intention to start warning Gmail users that their account might be targeted by state-sponsored attackers? A clear warning above the …
White House Military Office breached by Chinese hackers
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Open source NAC system PacketFence 3.5 released
PacketFence is a fully supported, trusted, free and open source network access control (NAC) system. Among the features provided by PacketFence, there are: BYOD (Bring Your …
Do you need a honeypot?
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Best Buy warning users of account compromise?
Best Buy has apparently been deactivating some of its users’ accounts and notifying the owners about it via email. “We are currently investigating increased …
Open source IDS Suricata 1.3 released
Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. Several characteristics of …
Real-time alert system shows active cyber attacks in 3D
A solution to the problem of how to spot cyber attacks on a network as soon as they have begun might just be coming from Japan, reports DigInfo TV. Researchers from the …
A basic shift in network defense
“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …
How to spot automated Web application attacks
Imperva released its April Hacker Intelligence Report Automation of Attacks, which analyzes how and why attacks on Web applications are automated. As much as 98 percent of …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments