Adobe Flash Player sandboxed in Safari on OS X Mavericks
After having worked with Google, Microsoft and Mozilla to incorporate an app sandbox for Flash Player, Adobe has announced that Safari in the recently released OS X Mavericks …
US allies demand explanations about NSA surveillance
Following Le Monde’s Monday report on NSA’s systematic gathering of phone call data of French citizens and the recording of certain calls and text messages has …
GTA 5 cracked PC game scams users
Thousands of impatient gamers have been duped into downloading and running a bogus Grand Theft Auto V version for PCs that made them complete a number of surveys and …
DARPA announces cyber defense tournament with a $2 million cash prize
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security …
What has changed in ISO 27001?
Learn what has changed in ISO 27001 using this easy to understand infographic, click the image to get the complete version: The key differences are detailed including: Most …
Most young adults not interested in a cybersecurity career
While U.S. government officials find the current pipeline for cybersecurity talent to be lacking, 82 percent of U.S. millennials say no high school teacher or guidance …
Cyber attacks targeting the energy sector on the rise
Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …
Young employees don’t care about corporate policies
There’s a growing appetite of Generation Y employees to contravene corporate policies governing use of own devices, personal cloud storage accounts and new technologies …
Free eBook: OpenSSL Cookbook
If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …
IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Attackers use smaller botnets to launch high-bandwidth attacks
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities, according to Prolexic. “This quarter, the major concern is that reflection …
Different adversary classes within security
Akamai Director of Security Intelligence, Josh Corman, gives an overview different adversary classes and their motivations.
Featured news
Resources
Don't miss
- Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
- Microsoft 365 users targeted in device code phishing attacks
- More than half of public vulnerabilities bypass leading WAFs
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed