March 03, 2015 Added by:Robert Vamosi
To better combat the increasing use of the Dark Web for illegal purposes, DARPA, the U.S. military’s Defense Advanced Research Projects Agency, is building a search engine known as Memex for law enforcement use.
February 19, 2015 Added by:Scott Fitzpatrick
It’s fascinating to watch the political climate being held sway with what are identified as “cyber terrorism” and “cyber war.” But it’s not the first time the Department of Defense has had to come to grips with a polemic decision that would require reengineering their entire fiscal architecture.
Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams
February 09, 2015 Added by:Thu Pham
If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.
February 03, 2015 Added by:Joseph Pizzo
When it comes to security, be it data in motion, data in execution or data at rest, the bad guys often lurk in plain sight. They have the time and patience to wait for a distraction that allows their malicious activity to go by unseen.
January 29, 2015 Added by:Patrick Oliver Graf
Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?
January 22, 2015 Added by:Patrick Oliver Graf
Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?
January 15, 2015 Added by:Tripwire Inc
If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.
January 07, 2015 Added by:Rebecca Herold
In early December, there were several reports about yet another type of ransomware, VirRansom, the next evolution of ransomware. It combines the ransomware feature of making data unavailable and locking up your computer until you pay the crooks a ransom with the feature of a virus, which allows it to spread to others.
November 24, 2014 Added by:Tripwire Inc
Phishing scams come in all shapes and sizes. But one thing is for certain: they are all around us.
Assessment of Visual Voicemail Security... Simran Maan on 03-04-2015
Seven “Sins” of Cyber Security... abdul bari Chanessra on 03-04-2015
FBI Overreaches with May First - Riseup Serv... mike lines on 03-04-2015