Email Alerts
-
Bruce Schneier: China cyberwar rhetoric risks dangerous implications
Video: Bruce Schneier explains why ongoing China cyberwar rhetoric evokes the wrong responses and may damage personal privacy, and ultimately freedom. Video
-
'Internet underground' fight demands better cybersecurity intelligence
Former U.S. national security advisor Greg Rattray believes better cybersecurity intelligence is needed to combat a growing "Internet underground." News
-
Cyberwar calls for software and system investment, not hacking back
Hacking back isn't the way to win the cyberwar. Gary McGraw says building software and systems with fewer vulnerabilities is stronger protection. Tip
-
RSA 2013 crowd awed by live 'sinkholing' in P2P botnet takeover
Tillmann Werner of CrowdStrike wowed onlookers with a live 'sinkholing' demonstration, taking down the Kelihos P2P botnet. News
-
RSA 2013: China not the only cyber espionage country, says Mandiant
China is not the only country carrying out large-scale cyber espionage, says US cyber security firm Mandiant. News
-
Spear phishing, manpower drive Chinese APTs, says researcher at RSA 2013
Chinese cyberattacks rely on spear phishing and overwhelming numbers, not sophisticated attack methods, says a researcher at RSA Conference 2013. News
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Answer
-
Peter Kuper on hacktivism, the evolution of hacking and mobile threats
In-Q-Tel's Peter Kuper discusses hacktivists’ desire for attention, and how the growing use of mobile devices is driving the evolution of hacking. Video
-
DDoS, SQL injection discussions trending in hacking forums, study finds
Hackers share attack techniques and vulnerability information, shedding light on what threats matter most, according to a new study. News
-
Use cybercrime statistics to combat organized cybercrime
Expert Michael Cobb provides some cybercrime statistics and discusses how organized cybercrime is using free Web analytics tools to plan attacks. Answer
Security Management Strategies for the CIO