Privacy takes center stage
AnchorFree anticipates digital privacy, security and access concerns will escalate in 2014 as the following consumer trends take shape. Shift to private and erasable social …
Privacy advocates announce day of protest against NSA spying
A broad coalition of activist groups, companies, and online platforms will hold a worldwide day of activism in opposition to the NSA’s mass spying regime on February …
Bitcoin cold storage and insurance services sprout
The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …
Fake Target breach notification leads to phishing and complex scams
The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …
Neiman Marcus, three other US retailers breached
In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …
CyberRX: First industry-wide healthcare cyber attack exercise
HITRUST will lead an industry-wide effort to conduct exercises to simulate cyber attacks on healthcare organizations, named CyberRX. The results will be used to evaluate the …
Mass-scale cleansing of co-opted computing devices
Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …
Key security program and budget data for CISOs
Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
Week in review: Target breach expands, the security realities of the Internet of Things
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: How to make malware warnings more effective? An effective security …
Sefnit Trojan endangers users even after removal
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …
Personal info of 70 million Target customers compromised
Target today announced updates on its continuing investigation into the recent data breach. As part of Target’s ongoing forensic investigation, it has been determined …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online