-
zvelo reaches 100 OEM milestone
Pivotal milestone attributed to strong adoption of zvelo’s URL database, website categorization and malicious website detection solutions for a vast array of applications
-
-
Including ads in mobile apps poses privacy, security risks
Researchers have found that including ads in mobile applications (apps) poses privacy and security risks; in a recent study of 100,000 apps in the official Google Play market, researchers noticed that more than half contained so-called ad libraries, and that many of the apps included aggressive ad libraries that were enabled to download and run code from remote servers, which raises significant privacy and security concerns
-
-
Triple-threat computer protection reduces identity theft
Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft; computer users who were running antivirus, anti-adware, and anti-spyware software were 50 percent less likely to have their credit card information stolen
-
-
U.K. holds amateur cybersecurity challenge to spur interest in field
For the past several weeks amateur cybersecurity experts have been searchingfor malware, defending against cyberattacks, and raising firewalls as part of Britain’s Cyber Security Challenge
-
-
Anonymous retaliates, takes down Interpol site
In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday
-
-
Cryptographic attack shows importance of bug-free software
Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used
-
-
Cybersecurity firm discovers mutant computer viruses
Cybersecurity firm BitDefender recently announced that it had uncovered multiple instances of computer viruses infecting other viruses to create “Frankenware”
-
-
Cyber-attackers think as regular crooks
An engineer and a criminologist are applying criminological concepts and research methods in the study of cybercrime; their work has produced recommendations for IT managers to use in the prevention of cyber attacks on their networks
-
-
U.K. unveils new cyber defense strategy
The U.K. government last week published its new Cyber Security Strategy; the government said the new strategy sets out “how the United Kingdom will support economic prosperity, protect national security, and safeguard the public’s way of life”
-
-
The 25 worst passwords of 2011
SplashData, a password management application provider, has released its annual list of the worst Internet passwords. The list was prepared from files containing millions of stolen passwords posted online by hackers. The worst password of 2011: “password.”
-
-
Government offers free cybersecurity protection tool for small businesses
To help small businesses guard themselves against hackers and computer criminals, the U.S. government is offering a free online tool that helps business owners bolster their cyber defenses; the Small Biz Cyber Planner will help business owners create their own customized cybersecurity plans by answering basic questions about their company and its online presence
-
-
Greatest cyber vulnerabilities are people, says cybersecurity expert
Dr. Cedric Jeannot, the founder and president of I Think Security, recently sat down with Eugene K. Chow, the executive editor of Homeland Security NewsWire, to discuss the latest rash in cyberattacks on companies, why hackers have been so successful, and the fallout from the RSA SecurID attacks
-
-
IBM acquires security threat, fraud detection software developer
Acquisition extends IBM’s menu of offerings for governments, law enforcement, retail, insurance, and healthcare clients in what the company describes as “the Era of Smarter Cities”
-
-
Penn State offers online minor in homeland security
Penn State is the latest to join the handful of educational institutes offering a minor in homeland security; the degree is available online and is designed to provide students with the skills needed to enter the homeland security field
-
-
Japanese pharmaceutical crippled by insider cyberattack
Last week a disgruntled former contract employee pleaded guilty for severely disrupting the networks of Shionogi, a Japanese pharmaceutical firm; the attacks were so severe that they crippled Shionogi’s operations for “a number of days, leaving employees unable to ship products, to cut checks or even communicate via email,” according to court documents
-
More headlines
Who's online
There are currently 0 users and 0 guests online.
The long view
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.