Gamers were knocked offline after Poodle Corp took Blizzard's servers in a social media ransom.
Can artificial intelligence and automation help close the security skills gap? Security execs want to know.
Each weekend we round up the news stories that we didn’t break or cover in depth but still deserve your attention. The post Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden appeared first on WIRED.
Love is accused of hacking into many U.S. government websites, like the Federal Reserve, NASA, and FBI. The post U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love appeared first on WIRED.
The API cryptographically confirms the identity of a device and the user trying to access a network service.
Does it count as a data breach if no data leaves your network?
Security experts and sysadmins be warned, the actuaries and accountants are headed your way.
Each month, in an attempt to keep our customers abreast of updates to BrickHouse Security’s ever-expanding product catalog, we’ll be highlighting some recent additions here, on our blog. Exciting Updates to GPS Services As we’ve previously...Show More Summary
Obama appointee Gregory Touhill has an opportunity to foster a substantive conversation with the public over privacy issues.
UK central government departments suffered 8,995 data breaches in just a year but the infrastructure isn't in place to properly report them
The automaker is partnering with Israeli cybersecurity experts to stay on top of digital threats to its vehicles.
We examine the frequency and scale of cyberattacks in the first half of 2016, and see whether security experts' predictions were on the money at the start of the year.
Threat intelligence, machine learning, and other buzzword techniques will be needed to improve our cyber defences, but don't throw out the older stuff.
All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it the Willie Sutton principle. Sutton, a famous bank robber in the 1920s–30s, was asked why he robbed banks. Show More Summary
The attack on the World Anti-Doping Agency, following the DNC hack, signals Russian hackers emerging from the shadows to brazenly flaunt their work. The post Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder appeared first on WIRED.
Names, addresses, and donation amounts were stored in the spreadsheet.
Is iOS 10 not compatible with your old iPhone or iPad? Want to squeeze a bit more life out of the device before you upgrade?
The latest edition of the Quarterly Threats Report (QTR) was released this week by McAfee Labs. If you’re not familiar with them, McAfee Labs is our research organization tasked with researching all the latest threats that people are...Show More Summary
The resumes were stored in an unprotected Amazon Web Services bucket.