Largest DDoS attack ever disrupts China’s Internet
The China Internet Network Information Center (CNNIC), which maintains the registry for the .cn, China’s country code top-level domain, has notified the public that two …
Leaked info of Federal Reserve employees was stolen during earlier breach
Hacker collective Anonymous has apparently leaked a file which supposedly contains personal details of every employee of the US Federal Reserve Bank – names, job titles, …
PHDVirtual releases virtual backup and disaster recovery software
PHD Virtual Technologies announced the availability of several new products including PHD Virtual Backup 6.5, which provides methods of virtual and cloud-based data protection …
NSA spied on UN officials after cracking encryption on UN teleconferencing system
The NSA has actively spied on United Nations’ officials and personnel after managing to compromise the encryption of the organization’s internal video conferencing …
First Round of HITBSecConf Kuala Lumpur speakers announced
Here’s a taste of some presentations you can expect at HITBSecConf Malaysia in October. You can register here. Conference speakers Collin Mulliner (Researcher, Systems …
WatchGuard partners with NCP engineering for IPsec VPN access
WatchGuard announced a partnership with NCP engineering to simplify IPsec VPN access for Microsoft Windows and Apple OS X users. NCP’s remote access VPN technology is …
Week in review: Cybercrime-as-a-service, Groklaw shutdown, WIn8 unfit for govt computers
Here’s an overview of some of last week’s most interesting news, reviews and articles: Lucrative business: cybercrime-as-a-service With the rise of cloud …
CyanogenMod announces secure phone locating, remote wiping service
The CyanogenMod team has announced a new service that allows users to locate their lost phones or securely wipe their device (including the contents of the SD card) in case it …
How encryption and tokenization help with cloud services adoption
Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …
Windows 8 shouldn’t be used on government computers, say IT experts
Internal documents of the German Ministry of Economic Affairs perused by a reporter of news outlet Zeit Online show (via Google Translate) that IT professionals working for …
Popular Windows downloader has secret DDoS capability
Unbeknownst to its users and perhaps even to its developers, the popular Windows download manager Orbit Downloader has been outfitted with a DDoS component. The Orbit …
Fingerprint algorithm for Android devices
Precise Biometrics AB has launched a new software product designed and optimized for embedding fingerprint verification on smartphones and tablets. Precise BioMatch Mobile …
Featured news
Resources
Don't miss
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- Global Threat Map: Open-source real-time situational awareness platform
- How Secure by Design helps developers build secure software