Stop using NSA-influenced code in our products, RSA tells customers

Officials from RSA Security are advising customers of the company’s BSAFE toolkit and Data Protection Manager to stop using a crucial cryptography component in the products
Officials: Edward Snowden’s Leaks Were Masked By Job Duties

More than three months after Edward Snowden revealed details of NSA secret surveillance activities, intelligence officials are still assessing the fallout from the former contractor’s disclosures. But they already know how the leaks happened.
Apple Reportedly Increasing Gold iPhone 5s Production In The Wake Of Huge Launch Demand

The gold iPhone 5s (which still seems more “champagne” to me) was a phone that seemed improbable when it was first rumored, but Apple did indeed make it
Gang of eight arrested over £1.3million Barclays computer hijack plot in carbon copy of Santander scam

A gang has been arrested on suspicion of hijacking the computer system in a Barclays bank to siphon off £1.3million.
3 Steps To Secure Your Business In A Post-Signature World

While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion’s share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses.
British Spy Agency Is Behind Belgacom Hack, Snowden Leaks Show

Documents leaked by NSA whistleblower Edward Snowden show that the United Kingdom’s Government Communications Headquarters (GCHQ) is responsible for the hack attack on Belgacom, Belgium’s largest telecommunications company.
Reducing Attack Surfaces with the SANS Top Four Controls

Companies are under immense pressure to improve cybersecurity performance by focusing on compliance and risk management initiatives.
Fast Scanning To Fuel ‘Golden Age’ Of Global Flaw Finding

A network scanner designed from scratch by three University of Michigan researchers can scan the entire IPv4 Internet in about 45 minutes, drastically reducing the speed at which such scans can be accomplished.
NT OBJECTives, Inc. Improves Web Application Security Programs

NT OBJECTives, Inc., provider of the most automated, comprehensive and accurate web application security software, application security testing services and SaaS, announced today that its NTOSpider On-Demand scanning service
Israeli ‘good guy’ hacker feted by PayPal

In the hacking world, it takes one to know one. For many corporations, the best defense against hackers is to actually hire a hacker and pay him or her to break into their sites or databases and expose weaknesses in a benign manner.