Brute Force Attacks and Their Consequences
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which I find very interesting. While I can’t repudiate what is being said, I can add my own insight into the anatomy post attack success. How Are […] more…A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took place this year. 2012 has certainly been a rocky one for online safety and consumer security as a whole, with numerous high-traffic websites breached and more malware and mobile threats than ever before. While it’s […] more…More information
- AT&T accused of violating privacy law with sale of phone records to CIA
- Microsoft and Workday team up to secure human-AI collaboration
- Google is developing a new operating system for everything
- New Year’s #sophoscrossword 2013/2014: And the winners are…
- Resolved: Access Account Maintenance
- SSCC 183 – It’s Data Privacy Day! Do something! [PODCAST]
- Your brain is sponging up toxic nanomagnets from polluted air
- Philips Tasy EMR CVE-2019-6562 Cross Site Scripting Vulnerability
- Dirty Dozen spam sending nations – find where you finished in our Q3 SPAMPIONSHIP chart
- Australian security board survives members’ vote