A threat advisory paper by information security firm Command Five has made the claim that Atlassian may be including a backdoor in its Crowd software.
Author: ISBuzz Team
Kim Dotcom addressed the NZ parliament’s intelligence and security committee on Wednesday, as its government considers allowing the normally foreign-focused Government Communications Security Bureau to spy on citizens.
The image on the screen (see below) shows a cyber-attack in progress, but it doesn’t look like the rows of reports that you usually expect to see as event data flows from intrusion prevention systems, next-generation firewalls and security reporting systems.
Last week I put together a post on an easy to use encrypted e-mail service known as Voltage SecureMail Cloud.
Major vulnerabilities in a protocol for remotely monitoring and managing servers would allow attackers to hijack the computers to gain control of them, access or erase data, or lock others out.
University researchers have built a program that mimics the way people play the memory game Concentration, opening the possibility of improving computer security by distinguishing human behavior from bots.
HTML Injection is a vulnerability which occurs in web applications that allows users to insert html code via a specific parameter for example or an entry point.
The state of California received some 131 reports of data breaches last year as firms are failing to adopt best practices for data security.
Ubisoft, the French game company that asked Kaspersky Lab to make sure hacking in its upcoming Watch Dogs game looks real, got hacked for real with names, emails and passwords stolen.
FloCon is an open conference providing a forum for operational network analysts, tool developers, researchers, and other parties interested in the analysis of large volumes of traffic to showcase the next generation of flow-based analysis techniques