Rapid7 offers free tools and terabytes of its own research
HD Moore, chief research officer at Rapid7, has called for all security professionals to collaborate on security data research and analysis to create greater awareness and …
NSA creates US citizens’ profiles by collecting metadata, public and commercial data
In 2010, NSA analysts were instructed to disregard previous restrictions when it came to analyzing phone call and email logs belonging to Americans that had connections to …
Latest IE 0-day still unpatched, attacks exploiting it go back three months
While Microsoft is yet to issue a patch for the latest Internet Explorer zero-day (CVE-2013-3893), reports are coming in that the flaw has been exploited more widely and for a …
The motives behind nation state driven cyber attacks
FireEye released a report that describes the unique international and local characteristics of cyber attack campaigns waged by governments worldwide. “Cyber weapons are …
UK to create new cyber defence force
Defence secretary Philip Hammond has announced that the UK is to create a new cyber unit and speak full cyber warfare competency including both offensive and defensive …
Two youngsters arrested for different DDoS attacks
Following the massive DDoS attack against anti-spam outfit Spamhaus earlier this year, a 35-year-old Dutch citizen believed to be Sven Kamphuis, the owner and manager of Dutch …
Average online bank account is accessed by 2.4 unique devices
Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …
Guidelines to manage increased IT risk
From cyberattacks and malicious employee actions to hacks into corporate social media accounts, 2013 is turning out to be a watershed year for technology-related enterprise …
Set, manage and monitor privileged account security
CyberArk announced Master Policy, a new “policy engine’ that enables customers to set, manage and monitor privileged account security in a single interface. The …
Protect high-value transactions on iOS and Android
SecureKey introduced its enhanced cloud-based briidge.net Connect multi-factor authentication service. This latest version of briidge.net Connect incorporates the new …
Cyberoam launches next-generation firewall appliances
Cyberoam unveiled Next-Generation Firewalls (NGFW) in its NG Series appliances. Cyberoam NGFW come with Layer 8 Identity-based technology for actionable intelligence and …
Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem
Here’s an overview of some of last week’s most interesting news, reviews and articles: IE 0-day attack reports push ISC to raise official threat level FireEye …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security