Security is no fiction
23 Sep | View galleries
Security is no fiction
23 Sep | View galleries
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
Hacking Team, a firm best known for helping governments spy on their citizens, has been hacked. Here's a curated look at the documents, contracts, and code discovered by researchers sorting the data online.
08 Jul | View galleries
Level 3’s research report analyses botnet activity around the world
19 Jun | View galleries
As a company that has no physical channels to serve customers, insurance-comparison giant iSelect has been heavily reliant on its contact centre and online presence since its inception nearly two decades ago. But with customer demand booming, the business expanding and its high profile attracting unwanted attention from online cybercriminals, the company began a two-year overhaul of its information-security environment to ensure it had a flexible could ensure the security and integrity of its core technology well into the future.
San Francisco’s Muni transit system was reportedly hit by ransomware since Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.
It may have started as a guideline for protection of credit-card information, but the payment card industry’s PCI DSS (Payment Card Industry Data Security Standard) is rapidly gaining a following across other industries as a more general framework for data security.
Michael Flynn, the man President-elect Donald Trump plans to name as U.S. national security advisor, believes the government is falling behind on cybersecurity.
Firms in the $50bn online ad industry can now apply for a security seal to signal they’ve done enough to prevent criminals exploiting news to spread ransomware.
Some software you may know and lean on won't work in El Capitan due to a new security feature that locks down system files and directories. Here's how to modify that.
Need antivirus for your PC, but not sure which of the numerous programs to choose from? Let some independent test data be your guide.
Your mobile IP address isn't likely to be stolen. But you still need to take precautions.
Proactive is Apple’s name for an intelligent iOS 9 technology wants to help you get things done – but shockingly it tries to keep your private life private.
I was walking through San Francisco when my phone buzzed. No caller ID, but the phone number was local, so I picked it up. Calling the man on the other end "irate" would be an understatement.
How the Snowden leaks have contributed to the larger conversation about privacy and security.
The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.
The burgeoning market for gadgets that trigger a sprinkler system, help you count the number of times you swing a bat, or dim the lights automatically are rising. That’s a concern for any business due to how these devices are also starting to show up at the corporate office for use in conference rooms, executive suites, and even as a low-cost building security camera system. Experts claim the industry is not doing enough to protect these devices.
Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom
"Hunting is not a sport. In a sport, both sides should know they're in the game." - According to Field and Stream magazine, this is an oft quoted hunting expression. I couldn’t resist the irony of applying this quote to the cyber security industry where hunting is indeed a sport. The good guys and the bad guys both know that they are in the game.
"Pay Up or Else." It has become the modus operandi for a new generation of financially motivated cyber assailants. These hackers are leveraging new "pay-for-play" attack tools and services that are available via the Darknet, making ransom cyber-attacks available to even the most novice hackers. Download Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS – and What to Do About It, to understand: • The current threat environment and why ransom attacks are increasing in popularity • How to differentiate between the real and fake ransom attacks • Attack tools and services now available to hackers via the Darknet • The most likely targets of ransom attacks and how to prepare