What are the most effective means for achieving IT ops excellence?
Based on results collected across a variety of industry verticals – including financial services, healthcare, manufacturing, and retail – Continuity …
Triggering deep vulnerabilities using symbolic execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …
Deadly new ransomware soon to be released?
As disruptive as Cryptolocker is, there’s a possibility that an even deadlier type of ransomware will soon be targeting unsuspecting users. White-hat security research …
Multi-protocol SoftEther VPN becomes open source
In March 2013, a Japanese student by the name of Daiyuu Nobori set up VPN Gate, a free VPN service that he hoped would be used by Internet users who wish to avoid their …
Palo Alto Networks acquires Morta Security
Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not …
Stealing money from ATMs with malware
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …
Microsoft releases BYOD best practices for enterprise workers
Microsoft is releasing best practices for enterprise workers who are considering using their personal technology device for work and play. This business trend, known as BYOD, …
New Linksys 802.11AC WRT router allows open source customization
Linksys is bringing back the heritage of the best-selling router of all time – the Linksys WRT54G but updated and modernized it with the most leading edge available …
SanDisk releases 64GB wireless flash drive
SanDisk announced the 64GB SanDisk Connect Wireless Flash Drive. In addition, recently released software updates enhance the performance and functionality of both the SanDisk …
“Unauthorized activity on your Amazon account” phishing email doing rounds
The pre-holiday online shopping frenzy has ended, but scam and phishing attempts continue unabated. The latest email spam campaign aiming for login credentials is one that …
How to make malware warnings more effective?
An effective security warning is concrete and clear, appeals to authority, and doesn’t pop up too often, say the results of a study into the psychology of malware …
WoW gamers targeted with trojanized Curse client
The DDoS attacks that temporarily took down Blizzard’s Battle.net and Valve’s Steam online gaming services over the end of the year holidays have undoubtedly …