Email Alerts
-
RSA 2013 crowd awed by live 'sinkholing' in P2P botnet takeover
Tillmann Werner of CrowdStrike wowed onlookers with a live 'sinkholing' demonstration, taking down the Kelihos P2P botnet. News
-
RSA 2013: China not the only cyber espionage country, says Mandiant
China is not the only country carrying out large-scale cyber espionage, says US cyber security firm Mandiant. News
-
Spear phishing, manpower drive Chinese APTs, says researcher at RSA 2013
Chinese cyberattacks rely on spear phishing and overwhelming numbers, not sophisticated attack methods, says a researcher at RSA Conference 2013. News
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Answer
-
Peter Kuper on hacktivism, the evolution of hacking and mobile threats
In-Q-Tel's Peter Kuper discusses hacktivists’ desire for attention, and how the growing use of mobile devices is driving the evolution of hacking. Video
-
DDoS, SQL injection discussions trending in hacking forums, study finds
Hackers share attack techniques and vulnerability information, shedding light on what threats matter most, according to a new study. News
-
Use cybercrime statistics to combat organized cybercrime
Expert Michael Cobb provides some cybercrime statistics and discusses how organized cybercrime is using free Web analytics tools to plan attacks. Answer
-
Aurora attackers target defense firms, use flurry of zero-days
Cybercriminals tied to the 2009 Aurora attacks have used a flurry of zero-day exploits and a new "watering hole" attack technique in targeted campaigns. News
-
Enterprise mobile device defense fundamentals
This Security School lesson will examine the realities of the security threat posed by mobile devices such as smartphones and tablets, the methods savvy attackers are using today to take advantage of vulnerable mobile devices, and the technology and ... partOfGuideSeries
-
FireEye warns of steady increase in advanced malware
Social engineering tactics often involve email attachments targeting various industry sectors, says the security firm. News
Security Management Strategies for the CIO