US intelligence heads speak for FISA preservation
Two opposite forces have clashed in Thursday’s open hearing by the US Senate Intelligence Committee on the subject of potential legislative changes to the Foreign …
NSA letter reveals details of NSA analysts spying on their lovers
Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies’ surveillance capabilities to spy on their love interest or other not …
Tor-using Mevade botnet is stealthy new version of old threat
The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …
Legislation aims to end bulk collection of phone records
In order to restore the constitutional liberties that have been eroded by invasive surveillance and end secret interpretations of the law that vastly exceed the intent of …
Challenges faced by top CSOs
(ISC)2 released new data that outlines the chief challenges faced by top enterprise security executives and illustrates the broad range of complex – and sometimes …
Cloud Security Alliance releases Cloud Controls Matrix 3.0
The Cloud Security Alliance (CSA) released the CSA Cloud Control Matrix (CCM) 3.0, the standard for assessing cloud centric information security risks. It expands its control …
Users want a seamless experience in public Wi-Fi
With smartphone and tablet usage continuing to explode, operator-deployed Wi-Fi networks are playing an increasing role in keeping users connected on the go. A new study …
Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY
This October, developers from around the globe have an opportunity to showcase their coding skills to an international audience at the HackWEEKDAY hackathon in Kuala Lumpur. …
Cybercriminals exploit most news within 22 hours
Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …
Watchful Software updates its information protection solution
Watchful Software released RightsWATCH 5.0, which extends the secure flow of information throughout an organization while automatically applying corporate security policies …
US government security background checks fumbled by investigators
Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …
Amateur hacker behind DDoS attack on China?
When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance