We've heard this question a lot, haven't we? I attended a conference about 2 1/2 years ago, and the agenda for that conference had about half a dozen or more presentations that contained "APT" in their title. I attended several of them, and I have to say ... I walked out of some of them.
How are ex-military and ex-hackers different? For starters, security guys with a military...
I've been an adjunct professor at NYU Poly for almost two years now. It's been a great...
The web intelligence firm Recorded Future has posted two stories about how al Qaeda is using new encryption software in response to the Snowden disclosures.
If you have an account and were asked to put a price on a monthly service fee, how much money would you pay to be inspired, to keep up with news events, or to stay in touch with family, friends and colleagues? You're paying for it now, of course, though not with money.
A recently unearthed targeted attack campaign suggests that Pakistan is evolving from hacktivism to cyber espionage.
Imagine discovering a secret language spoken only online by a knowledgeable and learned few. Over a period of weeks, as you begin to tease out the meaning of this curious tongue and ponder its purpose, the language appears to shift in subtle but fantastic ways, remaking itself daily before your eyes. And just when you are poised to share your findings with the rest of the world, the entire thing vanishes.
There's a gaping hole in thousands of unsuspecting people's computers that lets any random internet passerby not only look over their shoulder but reach through to take over their systems. The hole is caused by a remote access tool: specifically, unsecured use of a product known as Virtual Network Computing (VNC).
One of the main vulnerabilities used in the infamous Stuxnet attack — patched four years ago — is being used in attack attempts against millions of machines around the world, according to new data.
In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.
Black Hat USA 2014 hosted over 9,000 attendees in Las Vegas last week and featured 110 highly informative briefings. Don't fret if you missed it: Some of BHUSA's best talks have now been uploaded to YouTube.
While Android phones are constantly targeted by cyber criminals, the iPhone is considered more secure. Now, leaked documents from one of the world's leading surveillance companies have reaffirmed the idea.
I'm writing this post to voice a concern about trainings for incident response. I am painting this picture with a broad stroke. The picture does not apply to every $vendor nor does it apply to every training course.
Anyone who works closely with me knows I love to define things. Why? Because I want to ensure that everyone I work with talks about things in the same way, and that clear expectations are established on projects. Things tend to go wrong in the eDiscovery process when assumptions are made.
Thrifty attackers, are you tired of investing your dollars in a botnet that's constantly being disrupted by new anti-virus signatures and bot downtime? A "cloudbot" might be just what you seek.
It's no longer surprising when we hear a cryptocurrency exchange has suffered a security breach, but now a hacker has targeted mining pools — and managed to steal $83,000 in cryptocurrency as a result.
Efforts to pressure the automobile industry into better locking down cyber security in automated features of modern cars has intensified as a collective of security researchers sent the CEOs at major auto firms an open letter calling for them to adopt a new five-star cyber safety program.
A computer security company — it is rarely a government entity — comes out with a new report. Millions of stolen passwords. Tens of millions. No, hundreds of millions. The point is apparent: This is a big deal. Then it becomes clear this company is not simply informing the world out of some sort of noblesse oblige: It is trying to make money.