We try to host a Suits and Spooks event in different cities (other than Washington DC which remains a constant). Our Boston attendance was quite good last year, however I've been asked several times if we'd host a Suits and Spooks in New York City. What's your preference? Click here to take survey
When I started working for The Church of Jesus Christ of Latter-day Saints with the first role with the title "social" in it (see my sum-up here), I came in with a desire to serve, but only planning to be there for 6 months. I had been on my own for several years at that point and really enjoyed my independence. Show More Summary
Amid a growing battle between federal government agencies and hackers, cyberwarriors, and cyber-enemy nation states, the U.S. is ramping up its malware stockpile to 'hack back' at those who attack it.
This coming Tuesday, Microsoft will issue fixes for 33 vulnerabilities in total, including two critical flaws relating to Internet Explorer, affecting all versions of Windows.
The question that tops this story was recently posed to a panel of security and parenting experts by safesoundfamily.com. One of those experts was none other than our own CEO, Todd Morris, who offered one of the many salient pieces of advice found in the article. Show More Summary
The battle for control of dangerous digital shapes may have just begun. On Thursday, Defense Distributed founder Cody Wilson received a letter from the State Department Office of Defense Trade Controls Compliance demanding that he take down the online blueprints for the 3D-printable “Liberator” handgun that his group released Monday, along with nine other 3D-printable [...]
Users running Internet Explorer 8 — an estimated 23 percent of all IE users — should update their systems with an out-of-band emergency patch to prevent a zero-day flaw.
If gun control advocates hoped to prevent blueprints for the world’s first fully 3D-printable gun from spreading online, that horse has now left the barn about a hundred thousand times. That’s the number of downloads of the 3D-printable file for the so-called “Liberator” gun that the high-tech gunsmithing group Defense Distributed has seen in just [...]
An FBI guidance manual says the law enforcement agency is able to access U.S. residents' email, Facebook and Twitter messages, and private documents, without breaching the Fourth Amendment.
A new law has been proposed in order to try and deter hackers trying to steal sensitive commercial information in the United States.
Every week it seems that security products are used to shine a light on both humanity’s triumphs and absolute low points. This week is no exception; read all about how hidden cameras have uncovered child abuse, how GPS tracking is helping save the elderly, and much more. Show More Summary
Microsoft has confirmed reports that a zero-day vulnerability in its Internet Explorer Web browser is being actively attacked in the wild. While Microsoft works diligently to crank out a patch, it’s important for businesses and consumers...Show More Summary
Oracle issued a patch today for Java 7. Coincidentally, Java 7 has also been the target of recent attacks thanks to a zero-day exploit. For now, though, its anyone’s guess whether or not the new Java 7 patch actually addresses the zero-day exploits, or to what extent. First, a brief recap. Show More Summary
Java is under attack again. A zero-day vulnerability in Java is being actively exploited in the wild. The current attacks seem to be targeted, but security experts warn that more widespread attacks could be imminent. Next to Adobe Reader and Adobe Flash, Java is probably one of the most ubiquitous and widely used applications. Show More Summary
There never seems to be any shortage of Android malware reports circulating in the news, and today one came out that sounds alarming indeed. “Android Under Attack: Malware Levels for Google’s OS Rise Threefold in Q2 2012” was the title...Show More Summary
It’s Patch Tuesday again. This month is busier than most because on top of Microsoft’s security bulletins, Adobe is also releasing updates for Reader and Acrobat. Let’s start with Microsoft. There are nine new security bulletins for August, which resolve 26 different vulnerabilities. Show More Summary
Gauss joins the ranks of Stuxnet, Duqu, and Flame as an apparently state-sponsored tool of cyber espionage. This latest threat appears to be built from the same code foundation as Flame, and specifically targets bank credentials andShow More Summary
The hackers that hijacked Mat Honan’s online life, took over his Twitter account(s), and wiped out his iPhone, iPad, MacBook, and Google accounts in one fell swoop showed some perseverance in achieving that goal. Not all attackers are...Show More Summary
The Internet is abuzz this weekend as a result of the Gizmodo Twitter account getting hijacked. That incident was traced back to the hack of an Apple iCloud account--allegedly accomplished through social engineering. A Forbes.com story...Show More Summary
The nation’s critical infrastructure is at risk--a well-executed cyber attack could have a potentially devastating effect. Congress is trying to patch some of the holes with legislation, but a recent survey found that most security experts...Show More Summary