-
+14 +1
iPhone hack attack shows why we need to rein in the trade in spyware
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
-
+3 +1
What is a Hacker? An Overview of Hacking History and the Evolution of the Term Hacker | Hacked
A hacker is someone who looks for and exploits soft spots and weaknesses in a computer network or system. One can differentiate between White, Black and Gray Hat Hackers.
-
+17 +1
A Beginner's Guide To Password Management | Hacked
Online Password Management is a booming industry. Maybe you’re “one of the millions of Americans using the most popular passwords, such as ‘password,’ ‘trustno1,’ ‘abc123,’ ‘monkey’ or ‘letmein.’” If so, you’re at risk, as Morgan Slain, CEO of SplashData, a provider of password management applications, warns. He explains, “Hackers can easily break into accounts just by repeatedly trying common passwords.” 1Password By AgileBits (https://agilebits.com/) With 1Password, passwords are stored on locals devices and backed up to the cloud. The password file itself is password protected and encrypted, and one...
-
+1 +1
Cybrary - Free Online Cyber Security Training, Forever | Learn and Find Jobs
Cybrary is a completely FREE, forever, online Cyber Security training platform. Learn Information Security, for free and find jobs in the field!
-
+16 +1
Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net
“Free speech in the age of the Internet is not really free,” journalist warns.
-
+4 +1
The Internet Of Poorly Secured Things Is Fueling Unprecedented, Massive New DDoS Attacks
Last week, an absolutely mammoth distributed denial of service (DDoS) attack brought down the website of security researcher Brian Krebs. His website, hosted by Akamai pro bono, was pulled offline after it was inundated with 620Gbps of malicious...
-
+20 +1
We Need to Save the Internet from the Internet of Things
Long term, we need to build an internet that is resilient against IoT-based attacks. But that's a long time coming.
-
+4 +1
Security Design: Stop Trying to Fix the User - Schneier on Security
we've designed our computer systems' security so badly that we demand the user do all of these counterintuitive things. Why can't users choose easy-to-remember passwords? Why can't they click on links in emails with wild abandon? Why can't they plug a USB stick into a computer without facing a myriad of viruses? Why are we trying to fix the user instead of solving the underlying security problem?
-
+12 +1
Lust for public Wi-Fi trumps security concerns
Given a choice between security and free Wi-Fi, almost all of us will use the free internet connection.
-
+27 +1
Lawmakers Ponder Regulatory Remedy for IoT Security
The recent DDoS attacks by the Mirai botnet against various targets, including DNS provider Dyn, have drawn the attention of congressional leaders, who say there may be a need for regulation of IoT…
-
+25 +1
NTP: the rebirth of ailing, failing core network infrastructure
Network Time Protocol is how the computers you depend on know what time it is (this is critical to network operations, cryptography, and many other critical functions); NTP software was, until recently, stored in a proprietary format on a computer that no one had the password for (and which had not been updated in a decade), and maintained almost entirely by one person.
-
+23 +1
For two years, criminals stole sensitive information using malware hidden in individual pixels of ad banners
The criminals were able to send banner ads and javascript to their targets' computers by pushing both into ad networks. These networks aggressively scan advertisers' javascript for suspicious code, so the criminals needed to sneak their bad code past these checks.
-
0 +1
Successful DRaaS Partnership
Disaster Recovery-as-a-Service (DRaaS) can be a compelling answer for battle downtime and accomplish IT accessibility. On the off chance, if approached in
-
0 +1
Advanced Malware Detection
Cyber-crime is projected to exceed $2 trillion by 2019 and malware is the primary culprit in many of these security breaches. Today’s…
-
+13 +1
Viruses, spyware found in 'alarming' number of Android VPN apps
If you've thought of using a VPN to get around the Federal Court’s blocking of The Pirate Bay and other file-sharing websites, you might want to take a closer look.
-
+12 +1
Government-grade cyber-weapons used against Mexican soda-tax activists
An investigation revealing that Mexican soda tax supporters were targeted with NSO Group's government-exclusive spyware and exploit framework.
-
+2 +1
Cybersecurity Workforce Shortage Projected at 1.8 Million by 2022
The results from the eighth Global Information Security Workforce Study (GISWS) have been released this week. The workforce gap is estimated to be growing, with the projected shortage reaching 1.8 million professionals by 2022. While the gap is not news, the fact that it is growing is of great concern to an already exhausted workforce. The question of how to fill the gap has been answered, and millennials are an integral part of the plan. “For years, we’ve known about the impending shortage of the information security workforce, as evidenced by our study year over year,” said David Shearer, CEO,...
-
+1 +1
Wikileaks Sets Conditions for Helping Tech Companies Close CIA Hacks
Some companies have been slow to comply.
-
+50 +1
WikiLeaks Docs Reveal How The CIA Targets Windows Users
The files mostly pertain to Grasshopper, a framework used to build custom installation executables, and the agency's use of the Carberp malware in its Stolen Goods persistence mechanism.
-
+12 +1
How to secure the network's intelligent edge in the Internet of Things
Much of the IoT's value resides at the network's edge, where organizations collect some of their most sensitive information. Traditional security measures can't always protect this data. Experts weigh in on how to prevent physical access to the network through IoT devices and safeguard the data collected and processed at the edge.
Submit a link
Start a discussion