Brute Force Attacks and Their Consequences
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which I find very interesting. While I can’t repudiate what is being said, I can add my own insight into the anatomy post attack success. How Are […] more…A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took place this year. 2012 has certainly been a rocky one for online safety and consumer security as a whole, with numerous high-traffic websites breached and more malware and mobile threats than ever before. While it’s […] more…More information
- NASA sponsors worldwide hackathon
- Bitcoin Ponzi Scheme Collapses With a Loss of $5.6 Million
- Facebook warns users of potential state-sponsored attacks
- What is a firewall? How they work and how they fit into enterprise security
- Gigamon says it can analyze attacker SSL traffic without hitting performance
- WikiLeaks slams US for pursuing Snowden
- NSA can reportedly record every call made in a foreign country
- Snapchat to warn users about third-party apps, ask them to change their passwords
- Sleeping on your side may clear waste from your brain most effectively
- Microsoft Introduces New Password Spray Detection for Azure