Infosec analysts back away from ‘Feds attacked Tor’ theory

When Tor admitted early this week that some nodes on the network had suddenly and inexplicably gone dark, thanks in part to a malware attack, theories abounded as to just what was going on and why.
Analytics helping ‘smart’ Sydney Airport get off the ground

Sydney Airport – the main international gateway to Australia and the country’s busiest airport – is already claiming progress on its efforts to become a ‘smart airport’
U.K. average broadband speed up by 20 percent, but rural divide widens

Britain. Home of rolling hills, tea and crumpets, and cacophonies of hooded youths shouting abuse from their streetside benches at elderly passers-by.
IBM wants to create computer chips with a brain

IBM has announced the creation of a “breakthrough” software ecosystem designed for developing silicon chips that have an architecture inspired by the function, low power, and compact volume of the brain.
Securing your IT Security career

While UK and US unemployment figures are falling slightly, times are still difficult for many workers, and few are changing roles.
Is Cashing Out Bank Accounts Getting Harder?

In its simplest form, online banking fraud is a relatively straightforward process. Like all fraud chains, it can be split to main two parts: obtaining compromised credentials and cashout.
Those ‘invisible’ servers could open your network to hackers

I’ve written before about the huge benefits you can reap if you plan for large sitewide outages by giving yourself access to all the troubleshooting tools you’ll need ahead of time.
What Security Researchers Need to Know About the Law

Security researchers often walk a very thin line between what is legal and what is illegal, and knowing the difference is not all that easy, especially given the current state of the law.
Twitter hardens two-factor authentication with app-based secure logins

Barely two months after rolling out two-factor authentication, Twitter has beefed up its login procedures yet again, both to improve security and to make two-factor available to more Twitter users worldwide.
Nine out of 10 senior staffers have BYOD access to corporate data

Almost nine out of 10 senior staff members from Australian organisations have access to corporate data on their personal mobile phones.