Week in review: NSA taps Google and Yahoo, breaking game console security, phone calls more dangerous than malware
Here’s an overview of some of last week’s most interesting news and articles: ISO 27001 standard benefits, implementation tips and security controls Dejan Kosutic …
Tips for protecting your personal and business data
As the risk of security breaches continues to become more prevalent, it is increasingly important that consumers and organizations protect their confidential information. …
US Senate committee backs law to continue phone-record collection
A few days after a bill seeking to end the government’s dragnet collection of phone records has been introduced by US Senator Patrick Leahy and Congressman Jim …
Security misconceptions among small businesses
More than 1,000 SMBs participated in a joint McAfee and Office Depot survey last month, and the majority (66 percent) felt confident that their data and devices are secure and …
Lavabit and Silent Circle to create email impervious to snooping
The founders of recently shut down encrypted email service Lavabit and encrypted communications firm Silent Circle have announced the creation of the Dark Mail Alliance, a …
Retail sector slow in adopting new PCI standards
Tripwire announced the results of research on risk-based security management in the retail industry, and the news isn’t good: the majority of the retail sector is yet to …
NSA taps cables connecting Google and Yahoo data centers
The US NSA and its UK counterpart GCHQ have collaborated in tapping the overseas fiber-optic cables used by Google and Yahoo to exchange data stored in their many data centers …
Network IDS reduces “white noise” for more focus on critical vulns
RandomStorm has announced the latest release of its next generation network intrusion detection system (NIDS), StormProbe. StormProbe analyses all network traffic, using more …
Spike in suspicious traffic and TOR usage, says threat report
Solutionary has released its Security Engineering Research Team (SERT) Quarterly Threat Intelligence Report for Q3 2013, providing intelligence on key security threats …
Solving network security complexity with automation
Network security has become too complex to manually manage, and companies should consider automation and orchestration in order to increase IT agility while maintaining …
Exposing unknown threats with mathematical science
Cylance announced today the official worldwide release of CylanceV, a new cloud and on-premise solution to find what others miss in detecting advanced malware. CylanceV …
Counterfeit money detector easily hacked to accept fake money
A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …