Gaza Cybergang Group1, operation SneakyPastes...Df3f3ad279ca98f947214ffb3c91c514 e8a29c7a6f6c0140152ca8a01e336b37 March 2016 president abu mazen meetings with khaled meshaal.lha dw.downloadtesting.com (184.108.40.206) f9bcc21fbb40247167c8c85ed6ef56e3 March 2016 دراسة.lha Dl.topgamse.com (220.127.116.11) D9dbb65a42ffe0575f0e99f7498a593e April 2016 برقية الخارجية السعودية لسيادتكم يرجي الإطلاع – مهم.exe... more…
What can secure software development learn from Shakespeare, Roosevelt and Nehru?...Do you know what William Shakespeare, Eleanor Roosevelt and Jawaharlal Nehru have in common with the data security expert community (and possibly you)? The Security Development Conference held in... more…
- San Bernardino prosecutor raises concerns about ‘cyber pathogen’ in terrorist’s iPhone
- Microsoft Windows 8 brings malware improvements, says antivirus researcher
- UK Crime Agency Website Downed by Hackers as Revenge
- Resolved: Maintenance activity on White1 router.
- Advertising in mobile apps – how much is too much?
- Judge asks if Alexa is witness to a double murder
- The Citadel crimeware kit – under the microscope
- 80 to 0 in Under 5 Seconds: Falsifying a Medical Patient’s Vitals
- French surveillance law is constitutional, highest court says
- CSO Online’s 2016 data breach blotter