March 05, 2015 Added by:Brian Prince
One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.
March 05, 2015 Added by:Anthony M. Freed
A new study reveals that two-thirds of IT leaders across a broad range of industry verticals believe they lack the resources required to support a robust security program in the face of escalating security threats.
March 05, 2015 Added by:Tripwire Inc
The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new.
EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation
March 05, 2015 Added by:Electronic Frontier Foundation
EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).
March 04, 2015 Added by:InfosecIsland News
Suits and Spooks London 2015 will be our first 2-day international event, and is jointly produced with techUK, an association of over 850 companies that's funded by the British government.
March 04, 2015 Added by:Eduard Kovacs
The notorious Angler exploit kit has started leveraging a new technique to ensure that its malicious activities are not interrupted when the domains it uses are blacklisted, researchers at Cisco revealed on Tuesday.
March 04, 2015 Added by:Tripwire Inc
Companies like mine, and consultants like me, have long been instructed and expected to pass on the mantra that the solution to security is compliance with standards and that being in compliance means you are secure. Having worked in the industry for more than a decade, I know that this is demonstrably not true.
March 04, 2015 Added by:Brent Huston
This article about research showing how malware could be hidden in Blu-Ray disks should serve as a reminder to us all that a lot of those “smart” and “Internet-enabled” devices we are buying can also be a risk to our information.
March 04, 2015 Added by:Pierluigi Paganini
A GAO report to FAA reveals that the systems adopted in the Aviation industry are still affected by weaknesses that could be exploited by hackers.
March 03, 2015 Added by:Brian Prince
According to Sophos, the malware is now hiding the malicious payload in Windows registry instead of writing the file on disk.