Gathering and understanding cyber intelligence is the work of BlackForest, a new open source intelligence gathering system developed by information security specialists at the Georgia Tech Research Institute (GTRI). By using such information to create a threat picture, BlackForest helps corporations, government agencies and nonprofit organizations battle increasingly-sophisticated threats to their networks.
A key to reducing cyber crime is getting victims — often major corporations — to cooperate with...
In an interview with former National Security Agency Director General Keith Alexander, Foreign...
It has been over a year since The Guardian reported the first story on the National Security Agency’s surveillance programs based on the leaks from former NSA contractor Edward Snowden, yet the national conversation remains largely mired in a simplistic debate over the tradeoffs between national security and individual privacy. It is time to start weighing the overall costs and benefits more broadly.
Cybersecurity is being pushed in two directions. On the one hand, the growing complexity of information systems and the onslaught of threats facing them are putting a premium on speed. Automation is the future of security.
Recently, a hacker who's been campaigning to make a point about Apple security by playing fast and loose with the now widely-accepted definition of "backdoor" struck gold when journalists didn't do their homework and erroneously reported a diagnostic mechanism as a nefarious, malfeasant, secret opening to their private data.
Hackers only need to find one weak point to steal valuable information. On the flip side, you need to account for every possible vulnerability across your entire infrastructure. Doesn't seem fair, but it's the world we live in.
Microsoft's Internet Explorer (IE) has become the most patched software product, receiving more security patches in the first six months of this year than Adobe or Oracle software, a report by Bromium Labs has found.
Ever posted a picture of your cat online? Unless your privacy settings avoid making APIs publicly available on sites like Flickr, Twitpic, Instagram or the like, there's a cat stalker who knows where your liddl' puddin' lives, and he's totally pwned your pussy by geolocating it.
Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing power from innocent victims when there’s so much free processing power out there for the taking?
Security experts are warning that tens of thousands of WordPress sites have been compromised thanks to a known vulnerability in the MailPoet plug-in, leading to mass defacements, spam and outages.
Google has hired a prolific hacker by the name of George Hotz to join the Project Zero team. Hotz is well-known for hacking Sony's PlayStation 3 and Apple's iPhone.
According to the National Institute of Standards and Technology, approximate matching is a technology that can be used in a variety of settings, including digital forensics, security monitoring and data filtering. It involves locating similarities among pieces of digital data to match objects that are alike or to find objects that contain other objects.
For small businesses looking to reduce their exposure to data theft the good news is the advantage of being small.
Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet. Google has revealed a new white-hat security team it has formed that will root out vulnerabilities in all software that touches the Internet.
Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.
U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.
Security information and event management (SIEM) has been an area where I have spent considerable time researching. My research started out as curiosity to see if the technology could solve some problems then continued to get organization buy-in followed by going all in to architect, implement, and manage a SIEM for my organization.
Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.
Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cyber crime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.
Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.
Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.
The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.
As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.
AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.
Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.
Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.
The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.
- Page 1