It seems, based on recent announcements from the likes of HP and CrowdStrike, that crowdsourcing and open source are really taking off as ways of getting the information security industry sharing the latest cyber threat intelligence.
Lancope, Inc., a leader in network visibility and security intelligence, will deliver a complimentary webinar on Thursday, Sept. 26 at 11:00 a.m. U.S. Eastern time entitled, “Hunting Attackers with Network Audit Trails.”
When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.
In the era of the internet, hackers are seen as noble figures – anarcho-libertarians, standing up to the man, exposing government secrets and corporate misdeeds.
Most security professionals agree that we can’t effectively stop malware by blacklisting signatures; the approach used by most antivirus applications.
It appears the verified Twitter account British rapper Costadinos Contostavlos, better known as Dappy, has been hacked.
Security researchers have spotted a surge in attacks against online banking customers, thanks to a new strain of Java-exploiting Trojan Caphaw (aka Shylock).
Apple says it will fix an embarrassing security flaw on its new iOS 7 software which hackers showed can bypass the lockscreen and access personal data.
Coders like to tell a joke. There are two types of people, it goes: those who have been hacked, and those who are about to be hacked.
Another iOS 7 lockscreen bypass has surfaced.