All Blogs / Technology / Security / Popular

Update on the Beebone Botnet Takedown

On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional...Show More Summary

BT to start hacking connected cars, as cyberattack risks increase

The UK phone and telecoms giant's new "ethical hacking" service aims to fix security vulnerabilities in cars long before they roll off the production line.

Where did Mt. Gox's missing bitcoins go?

A new report alleges that the missing cache of bitcoins was long gone before Mt. Gox's demise in 2014.

Russian hackers exploit Flash, Windows flaws to spy on diplomats

Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.

Raytheon to pour $1.7 billion into cybersecurity joint venture

Raytheon is expected to announce plans to acquire Websense in order to bring government security solutions into the enterprise.

Batman Vs Superman Trailer Is Here

"Tell me, do you bleed?" Film batman vs superman Dawn of Justice zack snyder ben affleck

AEI - Norse: Subverting Cyber Security Research For Political Fear-Mongering

"I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington D.C. think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick...Show More Summary

Refurbished, reconditioned and remanufactured – what do these terms really mean?

We see the term ‘refurbished’ all the time (along with many other phrases) but where do these products come from, and, are they worth checking out? Enterprise refurbished reconditioned off-brand used hard drives printers computers scanners routers

How Twitter is fighting trolls while balancing freedom of speech

Twitter's general counsel said in a Washington Post editorial: "Open discussion doesn't mean much if some people are afraid to take part."

Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence

A collection of notable security news items for the week ending April 17, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.

New Dark-Web Market Is Selling Zero-Day Exploits to Hackers

A darknet marketplace called TheRealDeal Market has emerged, focusing on brokering hackers’ zero-day attack methods. The post New Dark-Web Market Is Selling Zero-Day Exploits to Hackers appeared first on WIRED.

Star Wars Force Awakens Trailer Fan Reaction

Fans at Star Wars Celebration rave Film Star Wars Star Wars The Force Awakens Harrison Ford JJ Abrams

Guardians of the Galaxy Sequel News

The soundtrack has to live up to big epxectations too Film Guardians of the Galaxy Awesome Mix Volume One

Ryan Gosling Up For Blade Runner Sequel

Sequel set to shoot next summer Film Blade Runner Blade Runner sequel Harrison Ford Ryan Gosling

GitHub issues first transparency report; 40 accounts affected

Forty accounts amounts to just 0.0005 percent of the site's total 8 million active accounts.

The tax scam season: What to watch out for

The tax season is a popular time for cybercriminals to strike -- and what is in store for us this year?

Palo Alto Networks, McAfee, Websense gateway systems allow malicious traffic to slip through the net

Researchers claim a number of high-profile gateway solutions do little to interrupt or prevent malicious communications.

IBM makes decades worth of cyber-threat data public

IBM's X-Force Exchange aims to be one of the largest and thorough catalogs of vulnerabilities in the world, helping companies to defend against cyber-crimes in real-time.

Dropbox launches HackerOne bug bounty program

Researchers who report vulnerabilities in Dropbox software can expect a cash reward.

Copyright © 2015 Regator, LLC