Please turn on your JavaScript for this page to function normally.
Strategies of a world-class computer security incident response team

Today’s Computer Security Incident Response Team (CSIRT) should have everything they need to mount a competent defense of the ever-changing IT enterprise: a vast array …

Researcher ropes poorly protected devices into botnet to map the Internet

A fascinating but technically illegal experiment conducted by an anonymous researcher has witnessed over 420,000 Internet-connected devices being roped into a botnet that …

Hacktivists leak info on undercover Montreal police officers

The names, phone numbers and job titles of thousands of police officers and other employees of the Montreal police department (Service de police de la Ville de Montreal, or …

Chinese military hacker unit cleaning up its tracks

When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

Scan, monitor and analyze SSL-encrypted communications

SSL Locksmith exposes the contents of SSL-encrypted network communications, which eliminates a critical cyber security blind spot. Many network and security applications are …

Xbox Live accounts hack performed by attackers that hit Krebs and Honan?

Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social …

LogRhythm and Rapid7 partner on threat protection and security analytics

LogRhythm and Rapid7 announced API-level integrations of the LogRhythm SIEM 2.0 platform with both the Rapid7 Nexpose vulnerability management product and the Rapid7 …

South Korean organizations under cyber attack

A suspected cyber attack has paralyzed computer networks at three broadcasting organisations and two banks in South Korea. The organizations’ networks had been …

Protecting sensitive information on iOS devices

We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …

Linux community adopts UEFI technology

The Unified Extensible Firmware Interface (UEFI) Forum, a non-profit industry standards body of leading technology companies that promotes firmware innovation by creating …

ID Network Attributes provides insight into identity risk

ID Analytics launched ID Network Attributes, targeted consumer behavior insights that provide visibility into the risk of an identity or transaction. Available in both Fraud …

Don't miss

Cybersecurity news