UK to create new cyber defence force
Defence secretary Philip Hammond has announced that the UK is to create a new cyber unit and speak full cyber warfare competency including both offensive and defensive …
Two youngsters arrested for different DDoS attacks
Following the massive DDoS attack against anti-spam outfit Spamhaus earlier this year, a 35-year-old Dutch citizen believed to be Sven Kamphuis, the owner and manager of Dutch …
Average online bank account is accessed by 2.4 unique devices
Each month, The ThreatMetrix Global Trust Intelligence Network (The Network) screens more than 500 million site visitors, across more than 1,900 customers and 9,000 websites …
Guidelines to manage increased IT risk
From cyberattacks and malicious employee actions to hacks into corporate social media accounts, 2013 is turning out to be a watershed year for technology-related enterprise …
Set, manage and monitor privileged account security
CyberArk announced Master Policy, a new “policy engine’ that enables customers to set, manage and monitor privileged account security in a single interface. The …
Protect high-value transactions on iOS and Android
SecureKey introduced its enhanced cloud-based briidge.net Connect multi-factor authentication service. This latest version of briidge.net Connect incorporates the new …
Cyberoam launches next-generation firewall appliances
Cyberoam unveiled Next-Generation Firewalls (NGFW) in its NG Series appliances. Cyberoam NGFW come with Layer 8 Identity-based technology for actionable intelligence and …
Week in review: Data broker databases breached, Apple Touch ID hack, and possible solution to click fraud problem
Here’s an overview of some of last week’s most interesting news, reviews and articles: IE 0-day attack reports push ISC to raise official threat level FireEye …
Researchers may have solved the click fraud problem
Click fraud is a considerable drain on the finances of both advertiser and ad networks, but a group of researchers believed that they have managed to create a simple solution …
US intelligence heads speak for FISA preservation
Two opposite forces have clashed in Thursday’s open hearing by the US Senate Intelligence Committee on the subject of potential legislative changes to the Foreign …
NSA letter reveals details of NSA analysts spying on their lovers
Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies’ surveillance capabilities to spy on their love interest or other not …
Tor-using Mevade botnet is stealthy new version of old threat
The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …
Featured news
Resources
Don't miss
- Building cyber talent through competition, residency, and real-world immersion
- Browser agents don’t always respect your privacy choices
- Anubis: Open-source web AI firewall to protect from scraper bots
- Session tokens give attackers a shortcut around MFA
- AI isn’t one system, and your threat model shouldn’t be either