Attacking SCADA wireless systems
Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …
Mobile device data recoveries surge
Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …
Fortinet to acquire Coyote Point
Fortinet has entered into a definitive merger agreement to acquire Coyote Point Systems, a privately-held provider of application delivery, load balancing and acceleration …
Week in review: Becoming a malware analyst, South Korean cyberattacks, Apple implements two-step verification for iCloud accounts
Here’s an overview of some of last week’s most interesting news, videos, podcasts, reviews and articles: Becoming a malware analyst If you’re considering a …
Apple adds two-step verification option to iCloud accounts
Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …
On US, China, cyber espionage, and cyber war
The accusations and recriminations lobbed back and forth between the United States and China regarding alleged state-sponsored cyber espionage attacks have become almost a …
Infosec Twitter wisdom: March 22, 2013
Here’s food for thought from people you should be following on Twitter. An IP address is not a smoking gun. — Dave Lewis (@gattaca) March 21, 2013 There’s no …
BYOD and data protection top concerns with cloud adoption
According to a new AccelOps survey, 65 percent of organizations are using cloud services, while only 46 percent have moved mission-critical applications and data outside the …
Piracy and IP theft trouble software publishers
A joint survey by SafeNet and SIIA of more than 620 software developers and 194 enterprise software end users, revealed that developers continue to struggle with how to secure …
Unraveling the South Korean cyberattacks
Wednesday’s news that the networks of several South Korean broadcasting organizations and banks have been partially or entirely crippled by coordinated attacks has …
Cisco devices saddled with weakened password encryption
Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …
GFI WebMonitor 2013 brings web filtering to off-network laptops
GFI Software announced GFI WebMonitor 2013, the latest version of the company’s Web security and filtering solution targeted at SMBs. This new version enables IT …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down