Hacking an aircraft: is it already real?
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure industry that ever...
View ArticleLinux Foundation’s security checklist can help sysadmins harden workstations
If you’re a Linux user, especially a systems administrator, the Linux Foundation has some security tips to share with you, and they’re quite good. Konstantin Ryabitsev, the Foundation’s director of...
View ArticleMcAfee Labs quarterly report reviews five-year threat retrospective
#intel has released its #mcafee Labs quarterly threat report revealing the key cyber-attack developments from the second quarter of 2015. The report provides a recollection of #threats from the last...
View ArticleBitcoin community ‘needs to collaborate’ over security and scalability
The Bitcoin community has been urged by some of its most prominent members to do more to achieve “technical consensus” over security and scalability. More than 30 developers and contributors involved...
View ArticleWhich chat service should your business use? Different messaging services go...
Instant messaging services have become an essential part of our lives. Not only do we constantly use them to keep in touch with friends and family, but also to chat with work colleagues about business...
View ArticleSecurity Week 36: jailbreak theft, farewell to RC4 and holes in routers
In simple words, the brand new #iphone 164 will know everything about you. #google, which will have lived through 34 re-branding campaigns and 8 restructuring efforts, will store and process this data...
View ArticleIFA 2015: security all the go
The new trend on IFA 2015 — a trade-show for consumer #electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they are making...
View ArticleRussian spy gang hijacking satellite links to pilfer data
Researchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control...
View ArticleMy NSA security violation
About a year after I started at the National Security Agency, I suffered the embarrassment of being caught violating #nsa #security procedures. I was totally guilty and it was quite humiliating, as you...
View ArticleObama calls out China over cyberattacks
President #obama had blunt words for #china on Friday, weeks ahead of a visit to the U.S. by the Chinese president. Asked about #cyber threats during a town hall with U.S. troops, the president noted...
View ArticleWeek in review: Android ransomware multiplies, FireEye censors researcher
#hacker had access to sensitive info about #firefox bugs for over a year Mozilla has announced that an attacker managed to access #security-sensitive information about a considerable number of (at the...
View ArticleIndustrial security awareness continues to remain low
While traditional #manufacturing industries were not designed with security in mind, the proliferation of networks and devices, disparate communication channels, and the use of off-the-shelf software...
View ArticleKeystroke profiling
Also known as keystroke or typing dynamics, keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input....
View Article7 security and privacy concerns at the polls
A recent #poll by Wakefield Research delved into the psyche of the American voter asking them many questions about who will lead them through cyberspace the next four years. According to the survey,...
View ArticleCyber risk still poorly communicated to C-suite executives
#cyber risk continues to be poorly communicated to C-suite executives, according to #auriga consulting. The monopolization of the risk management function by IT and security consultants and poor...
View ArticleBypass Developed for Microsoft Memory Protection, Control Flow Guard
Introduced in #windows 8.1 Update 3 and Windows 10, #control flow guard was #microsoft’s latest antidote to #memory-corruption #attacks. The technology was meant to stand up to attacks that had long...
View ArticleCSO Survival Guide: Securing DevOps
In the past few years, #devops has moved from a niche approach to application development to an #enterprise #strategy that stands front and center in organizations today. And the move to DevOps is...
View ArticleXi: ‘China is ready’ for cyber crime dialogue
Chinese President #xi jinping is prepared to start a “high-level” cyber-security #dialogue with the United States. “China is ready to set up a high-level joint dialogue mechanism with the United States...
View ArticleNIST will award $3.6 million to projects designed to improve cybersecurity
The U.S. #department of commerce‘s National Institute of Standards and Technology (#nist) will award $3.6 million for three #pilot projects designed to make #online transactions more secure and...
View Article4 IoT Cybersecurity Issues You Never Thought About
Call it a physical and cyber-security #challenge. Innovators and industry experts in Boston Tuesday for the #iot Security 2015 conference brainstormed about some of the Internet of Thing’s most...
View Article