IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Attackers use smaller botnets to launch high-bandwidth attacks
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities, according to Prolexic. “This quarter, the major concern is that reflection …
Different adversary classes within security
Akamai Director of Security Intelligence, Josh Corman, gives an overview different adversary classes and their motivations.
Top U.S. cities for online fraud origination
ThreatMetrix announced data ranking the top U.S. cities for the origination of online fraud. The data reveals that Santa Clara, CA, is the nation’s top spot for online …
Smartphone users still unaware of identity theft threats
Four in ten (40%) smartphone users in the United States agree that they don’t understand cyber security well enough to know how to protect themselves, according to …
Video: Advanced password recovery and modern mitigation strategies
Think about all the passwords we use to access information every day. Whether it is email, social media, financial institutions or numerous other services, passwords have …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
How to social engineer a social network
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they …
The globalization of business is increasing exposure to fraud
The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected …
Data visualization of global DDoS attacks
Arbor Networks have collaborated with Google Ideas to create a data visualization that maps global DDoS attacks. Google Ideas – a “think/do’ tank – …
A new classification for potentially unwanted mobile apps
What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …
Higher education networks 300% more likely to contain malware
OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine