Congress should help DHS and DoD guard against domestic cyber attack
The United States Government must rethink its domestic cyber defense strategy. Even though the Departments of Homeland Security and Defense have the nominal lead in defending America from cyber-attack,...
View ArticleCovert Redirect mostly hype and certainly no Heartbleed
Known issue is mitigated in OAuth, OpenID specs; implementation problems are at issue
View ArticleComparing IE to Firefox, Chrome
Jefferson Graham / USA Today LOS ANGELES – This week the government and many corporate interests urged people to stop using the Internet Explorer browser after Microsoft found a security flaw that...
View ArticleQ&A: Elastica CTO Zulfikar Ramzan, on Heartbleed and online security
Zulfikar “Zully” Ramzan had been alerted to concerns about an Internet security bug called Heartbleed before word spread around the world that everyday passwords and sensitive account information were...
View ArticleSwiss bank hacker arrested
A Moroccan man wanted by Swiss police for hacking banks in Switzerland has been arrested in Bangkok, police said on Saturday.
View ArticleSwiss bank hacker arrested
A Moroccan man wanted by Swiss police for hacking banks in Switzerland has been arrested in Bangkok, police said on Saturday.
View ArticleSentencing set for June for Toyota hacker
A computer programmer from central Kentucky who once did contract work for Toyota is scheduled for sentencing June 4 after being convicted of hacking into and damaging computers used by the automobile...
View ArticleWarbiking Reveals Worrying State of Wireless Security
IT security company Sophos highlighted the worrying state of wireless security in the UK’s capital city, when it sent security expert James Lyne and his computer-equipped bicycle onto the streets of...
View ArticleJohn McAfee launches new secure messaging app ‘Chadder’ to keep your chatter...
The man who founded McAfee Anti-Virus has launched a new app aimed at providing secure instant messaging that can’t be read by anyone but the intended recipient.
View ArticleCoordinated Exercise Prepares For Threat Of Cyber-Attack
Dozens of public agencies and private companies have joined forces to hold a communications exercise that prepares for the threat of a cyber-attack.
View ArticleHacktivists can’t win with Israeli security system
Foresight, an Israeli cyber-security firm, last week started to offer a new service, called Defacement Mitigator, which replaces a site with the original content as soon as the site is compromised.
View ArticleEurope’s Cybersecurity Policy Settings Under Attack
BRUSSELS – Even as Europe powered up its most ambitious ever cybersecurity exercise this month, doubts were being raised over whether the continent’s patchwork of online police was right for the job....
View ArticleMiami Teen Under House Arrest After Allegedly Hacking Computer to Change Grades
Classmates of a high school student who allegedly hacked his way into a school computer to change his grade are calling his scheme for a higher GPA “pretty crazy.”
View ArticleWindows XP: Microsoft can’t wash its hands of the security problem so easily
Microsoft might want to draw a line under Windows XP; hackers and users will be reluctant to let it off the hook.
View ArticleHackers get to hone cybersecurity skills
Armed with laptops, they packed a lounge at the University of Massachusetts Boston on Saturday, diligently working to gain access to protected computer networks.
View ArticleComputer Security Part 1: Sullivan University Computer Science studies
There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves.
View ArticleGovt document verification service claims private sector players
The Australian government’s document verification service has signed up 23 private sector businesses, with the program claiming its first 2000 transactions to date, according to the nation’s...
View ArticleAFP asst commissioner backs metadata collection
Australian Federal Police assistant commissioner, Tim Morris, has backed the collection and storage of telecommunications metadata by telcos in a bid to combat cyber crime.
View ArticleWithout safeguards, smart home can be a dumb choice, expert says
The rise of smart technology worries cyber security expert Jerry Irvine, who believes many homeowners are unknowingly trading security for convenience when they install smart gadgets or systems in...
View ArticleGovt services to face massive security challenge: CSIRO
Australians could face rolling shutdowns of public infrastructure, massive data leaks from public services and a government defrauded of billions within the next decade due to an increasing potential...
View Article