Top IT Security Bloggers

  • Who is Anna-Senpai, the Mirai Worm Author?

    Krebs on Security
    On September 22, 2016, this site was forced offline for nearly four days after it was hit with “Mirai,” a malware strain that enslaves poorly secured Internet of Things (IoT) devices like wireless routers and security cameras into a botnet for use in large cyberattacks. Roughly a week after that assault, the individual(s) who launched that attack -- using the name “Anna Senpai” -- released the source code for Mirai, spawning dozens of copycat attack armies online.

    After months of digging, KrebsOnSecurity is now confident to have uncovered Anna Senpai’s real-life identity, and the identity of at least one co-conspirator who helped to write and modify the malware.
  • Stuxnet general pardoned by Obama – but deeper questions remain

    Sophos - Naked Security
    Departing president now accepts that Cartwright's involvement was more minor than at first thought
  • Talking it Out: Millennials, Certifications and Careers

    Isaca
    Editor’s note: ISACA Now recently moderated a conversation among a trio of millennials to discuss topics including professional development, networking, certification and how their generation differs from others when it comes to career priorities and workplace dynamics. The following is the first installment of the two-part conversation – edited for length and clarity – between Ashley Spangler, CISA, CISM, CRISC, SunTrust Banks, Inc., AVP Information Security; Leigh Ann Montgomery, CISA, Solut...
  • Remote code execution vulnerability affecting Facebook's servers earns researcher $40,000

    Graham Cluley
    Facebook has awarded US $40,000 to a security researcher who achieved remote code execution on its servers by exploiting a widely-publicised vulnerability.
    David Bisson reports.
  • Pwn2Own Returns for 2017 to Celebrate 10 Years of Exploits

    Trend Micro - Cloud Security Blog
    We are nine weeks away from Pwn2Own™ 2017 returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the rise of nation-state...
  • Uncovering the Inner Workings of EyePyramid

    Trend Micro - Security Intelligence
    Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called "EyePyramid", which we first discussed last week. (Conspiracy theories aside, the name came from a domain name and directory path that was found as part of the research.)
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Uncovering the Inner Workings of EyePyramid
  • Uncovering the Inner Workings of EyePyramid

    TrendLabs - Malware Blog
    Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called "EyePyramid", which we first discussed last week. (Conspiracy theories aside, the name came from a domain name and directory path that was found as part of the research.)
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    Uncovering the Inner Workings of EyePyramid
  • Artificial intelligence can be used to predict your death – but is it secure?

    Sophos - Naked Security
    Researchers say this is the first study to use AI to predict heart disease outcomes
  • The return of the cyber squirrel wars

    Sophos - Naked Security
    Rodents and frogs join nation states and hackers as key security threats
  • Not lovin' it! Researcher finds way to steal McDonald's users' passwords

    Graham Cluley
    A security researcher has discovered two vulnerabilities that allow an attacker to steal users' passwords from McDonald's official website.
    David Bisson reports.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place