- AT&T hacker Weev released from prison after appeals court overturns conviction
- Symantec draws new security picture
- Confirmed: hackers can use Heartbleed to steal private SSL keys
- Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA
- Rising security threat should motivate better employee support: Symantec
Anonymous in pictures
Dropbox service returned Friday night, after an outage of several hours that the file-sharing service blamed on an issue that came up during regular maintenance. A social network post allegedly from a hacker group had claimed responsibility for the outage, but Dropbox dismissed claims that user info had been leaked as hoax.
Anonymous members, charged with a distributed denial-of-service attack on PayPal, entered a plea Thursday that could see some of them walk free at sentencing next December.
A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.
Why are the world's most IT savvy companies unable to keep attackers out of their networks?
The 2012 London Olympics was targeted by what appeared to be a state-sponsored cyber attack, one of six major attempts to disrupt the event.
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
Sign up now »
Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.