Cyber attacks targeting the energy sector on the rise
Alert Logic examined the rise of cyber attacks targeting the energy sector—an industry thought to be particularly at risk due to the highly confidential and proprietary …
Young employees don’t care about corporate policies
There’s a growing appetite of Generation Y employees to contravene corporate policies governing use of own devices, personal cloud storage accounts and new technologies …
Free eBook: OpenSSL Cookbook
If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …
IBM unveils new cloud solution
IBM announced a new cloud solution that combines software analytics and cloud security services to fend off web-based DDoS attacks for organizations doing business on the web …
Attackers use smaller botnets to launch high-bandwidth attacks
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities, according to Prolexic. “This quarter, the major concern is that reflection …
Different adversary classes within security
Akamai Director of Security Intelligence, Josh Corman, gives an overview different adversary classes and their motivations.
Top U.S. cities for online fraud origination
ThreatMetrix announced data ranking the top U.S. cities for the origination of online fraud. The data reveals that Santa Clara, CA, is the nation’s top spot for online …
Smartphone users still unaware of identity theft threats
Four in ten (40%) smartphone users in the United States agree that they don’t understand cyber security well enough to know how to protect themselves, according to …
Video: Advanced password recovery and modern mitigation strategies
Think about all the passwords we use to access information every day. Whether it is email, social media, financial institutions or numerous other services, passwords have …
Nmap cheat sheet
Network Mapper – better known by its shortened name Nmap – is one of the most long-lived security tools out there. Used for scanning computer networks for ports, …
How to social engineer a social network
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they …
The globalization of business is increasing exposure to fraud
The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report. Overall, 70 percent of companies were affected …