NSA compromised 50,000 global computer networks
The NSA has managed to compromise over 50,000 computer networks in its effort to keep abreast of the political, military and economic situation around the world, Dutch daily …
Twitter adds Forward Secrecy to thwart surveillance efforts
Following in the footsteps of Google and Facebook, Twitter has joined the ranks of Internet companies that have (or are working on) implementing Perfect Forward Secrecy, and …
Week in review: vBulletin.com hack, new perspective on Stuxnet, and ongoing large-scale MitM attacks
Here’s an overview of some of last week’s most interesting news, reviews and articles: Netflix users in danger of unknowingly picking up malware Users of …
Large-scale net traffic misdirections and MitM attacks detected
Man-In-the-Middle BGP route hijacking attacks are becoming regular occurrences, but it’s still impossible to tell who is behind them, and what their ultimate goal is, …
Judge denies bail for alleged Silk Road owner
Ross William Ulbricht, the alleged 29-year-old founder of black market drug website Silk Road, has been denied bail by US District Judge Kevin Fox in the Southern District of …
Fake AV update notifications deliver malware
Spam emails impersonating a variety of antivirus vendors have been spotted targeting worried users around the globe, urging them to download and run an “important system …
Top 10 data disasters from 2013
Kroll Ontrack announced its 11th annual list of the top 10 data disasters from 2013. For the last 11 years, the company has annually been collecting and publishing a list of …
New threats subverting digital signature validation
McAfee Labs found new efforts to circumvent digital signature app validation on Android-based devices. The McAfee Labs team identified a new family of mobile malware that …
The risks of having a false sense of security
Organizations are overwhelmingly confident in their readiness to combat security threats, but may not be prepared for dangers linked to new technology models and increasingly …
NTRU public key crypto released to open source community
RSA and ECC are the two most common public-key crypto systems in use today. At the 2013 Black Hat conference, researchers declared that the math for cracking encryption …
Only half of healthcare IT pros use formal risk assessments
Tripwire and the Ponemon Institute evaluated the attitudes of 1,320 respondents from IT security, IT operations, IT risk management, business operations, compliance/internal …
Are tablets secure enough for business?
Amazon is launching its first enterprise-ready tablet. A smart move, as the much-loved mobile device can finally be integrated into business. However it does beg the question, …
Featured news
Resources
Don't miss
- The long conversations that reveal how scammers work
- Metis: Open-source, AI-driven tool for deep security code review
- How to cut security tool sprawl without losing control
- Product showcase: Proton Pass, a password manager with identity protection
- Internet slowly recovers after far-reaching Cloudflare outage