New NSA Leak Shows MITM Attacks Against Major Internet Services

The Brazilian television show “Fantastico” has exposed an NSA training presentation that discusses how the agency runs man-in-the-middle attacks on the Internet.
The NSA Disguises Itself as Google to Spy

It’s come to light that the NSA has impersonated Google—and possibly other big websites—in order to intercept, store, and read supposedly secure online communications.
New Jersey suffers yet another state datacenter failure

It came as quite a surprise to the hundreds of people who showed up at NJ department of Mover Vehicles offices Thursday to find that there was no waiting in line.
IT firms recruit high numbers on big campuses, may hurt smaller colleges

Early placement trends from top campuses in the state indicate that the appetite to recruit large numbers remains continues. However, entry-level salaries for graduating engineers remain unchanged for the fifth year in a row at Rs 3 lakh to Rs 4 lakh.
Tech recruitment: why the British have the market stitched up

Bacon and eggs, rock and roll, Brits and IT recruitment – they’ve gone hand in hand for a long time. Sylvia Pennington finds out why UK professionals continue to dominate the high-tech hiring market in Australia.
Views of Latin American Consumers on Electronic Fraud – 2013

This report provides an analysis and evaluation of the data we collected on the views, attitudes and knowledge of Latin American consumers towards electronic fraud.
Botnet Businesses Face Growing Pains – Too Much of a Good Thing?

A few months ago we started tracking a botnet (arbitrarily named LazyAlienBikers) whose origins we did not know and whose malware was undetected.
DSD certification confirms sandboxing is Good for mobile security

The certification of a mobile-security sandboxing platform from Good Technology to EAL4+ standards will pave the way for the use of application-isolation techniques to secure mobile and bring your own device
Yahoo’s Mayer gives phone passcodes a pass

No gasps were heard wafting up from the audience at Tech Crunch Disrupt as Yahoo CEO Marissa Mayer admitted that she doesn’t use a passcode to protect her smartphone, but there should have been.
Why Remediating Assessment Results Might be Harmful to Your Business

Let’s say you’ve just had a pen test or security scan performed on your application. You review the list of findings and get to work on remediation.