Brute Force Attacks and Their Consequences
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which I find very interesting. While I can’t repudiate what is being said, I can add my own insight into the anatomy post attack success. How Are […] more…A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took place this year. 2012 has certainly been a rocky one for online safety and consumer security as a whole, with numerous high-traffic websites breached and more malware and mobile threats than ever before. While it’s […] more…More information
- Red Hat Buys Container Security Firm StackRox
- Data Brokers Are a Threat to Democracy
- Hacker Unlocks ‘High Security’ Electronic Safes Without a Trace
- Oregon Man Pleads Guilty to Hacking Celebrity Email Accounts
- Florida Effort to Block Election Hacking Gets Extra $2M
- UEM to marry security – finally – after long courtship
- Hong Kong Exchanges Denies Report of Printer Hacking Attack
- Interpol, Group-IB Unmask Pro-ISIS Hackers
- Kenyan Police Service teams up with Safaricom to deploy crime-fighting technology
- Can multiple moving cursors really hide your password from spyware and peepers? [VIDEO]