The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, AUGUST 31, 2016

Featured

Archives

Latest Comments

Social Networks

From microscopic entry-points (see the flawed chip endangering industrial systems), to macroscopic dangers (such as vulnerable/corrupted networks or wireless vulnerabilities), cyber threats count on attention slips to make their way in. And attention slips are inherently human.

Read more ...

A flash alert issued by the FBI earlier this month warns that unknown threat actors targeted the board of election systems of two U.S. states using widely available security testing tools. According to the alert, which is addressed to “need to know” recipients, one attack was detected in July and the second in August. In […]

Read more ...

Security incidents have been on the rise for the past few years in India. In fact, the number of cybersecurity incidents in India grew by 117 percent in 2015. As Indian organizations move more services online, the risk of a data breach will only increase. It is necessary to keep continuous tabs on your organization’s […]

Read more ...

The Defense Department for the second year in a row sent one of its top directors to DEF CON in Las Vegas this month, but it wasn’t for recruiting purposes. So what was Frank DiGiovanni, director of force training in DoD’s Office of the Assistant Secretary of Defense for Readiness, doing at DEF CON? “My purpose was to really learn from people who come to DEF CON …

Read more ...

Malware authors will leverage every tool and trick they can to keep their operations in complete stealth mode. Fingerprinting gives them this extra edge to hide from security researchers and run large campaigns almost completely undetected. To describe it succinctly, fingerprinting makes use of an information disclosure flaw in the browser that allows an attacker […]

Read more ...