Week in review: Target POS malware, Bitcoin insurance, and the future of net neutrality
Here’s an overview of some of last week’s most interesting news, videos and articles: The biggest challenge to IT security is marketing Most companies today are …
Researcher demonstrates SCADA zero-day, shares PoC
An Italian researcher well known for his exploration of industrial control systems (ICS) has demonstrated the exploitation of a zero-day flaw that can crash or lead to a …
NSA collects 200 million text messages a day
As the world awaits US President Obama’s official announcement of his plans for an NSA reform, The Guardian disclosed details of yet another NSA bulk data collection …
Bruce Schneier briefs US Congress on the NSA
Well known cryptographer and computer security expert Bruce Schneier has been called in to brief six members of the US Congress. The group, consisting of Representatives Zoe …
Researchers share more details about the Target POS malware
A handful of security companies have been researching the Target breach, and the information they unearthed is slowly trickling out to satisfy the public’s curiosity as …
Silk Road forfeits $28 million in Bitcoins
Preet Bharara, the United States Attorney for the Southern District of New York, announced the forfeiture of approximately 29,655 Bitcoins (which, at today’s Bitcoin …
Major developments that will drive Big Data in 2014
Companies are compelled to uncover real value in their data, and they’re turning to Hadoop as a key part of their data center strategy. In 2014, data centers will move …
How to implement incident reporting in cloud computing
Cloud security incidents often catch the media’s attention as they affect large number of users. For example, recently a large storage service provider suffered an …
Symantec seeks to patent technology for spotting malicious torrents
In most people’s minds, the concept of torrents is generally associated with pirated content. Despite this, everyone should know that BitTorrent is a file transfer / …
Malware used in Target breach sold on underground forums
Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …
New technology searches encrypted data in its encrypted form
Fujitsu Laboratories announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form. Searching data while it is …
Microsoft extends support for Win XP’s security solutions to mid-2015
Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground