Real-time data analysis increases DDoS defenses
Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events. Prolexic recommends that the information gleaned …
Hacker expo and all-women keynote line coming to Hack In The Box
Hack In The Box has announced HITB2014 Amsterdam will feature an all-new Haxpo – a massive Hacker Expo open for free to professionals and the public. Haxpo will be …
Protegrity expands enterprise big data protection capabilities
Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache …
Panda Security updates Cloud Office Protection
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …
Self-encrypted 2.5″ SATA SSD from Microsemi
Microsemi announced a secure, half-terabyte SSD for mobile video surveillance operations, SANs and other high capacity storage applications requiring superior real-time data …
Researchers hack femtocells, record mobile phones’ calls, SMS traffic
Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …
Snowden given asylum by Russia, leaves Moscow airport
NSA whistleblower Edward Snowden has been granted temporary asylum in the Russian Federation and has left the transit zone of Moscow’s Sheremetyevo airport, RT reports. …
Free first aid kit for computer viruses
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free …
All Facebook users get secure browsing by default
After having introduced secure browsing as an option in 2011, and having begun rolling out always-on HTTPS by default for users in North America late last year, Facebook is …
Keep your laptop safe while using Wi-Fi hotspots
The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a …
Malware attacks via malicious iPhone chargers
Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …
NSS Labs unveils Threat Modeling and Threat Forecasting
NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …
Featured news
Resources
Don't miss
- Smart grids are trying to modernize and attackers are treating it like an invitation
- A day in the life of the internet tells a bigger story
- AI vs. you: Who’s better at permission decisions?
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall