All Blogs / Technology / Security / Popular


Blizzard hit with DDoS attack disrupting play for gamers

Gamers were knocked offline after Poodle Corp took Blizzard's servers in a social media ransom.

?Structure Security: How much security can you automate?

Can artificial intelligence and automation help close the security skills gap? Security execs want to know.

Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden

Each weekend we round up the news stories that we didn’t break or cover in depth but still deserve your attention. The post Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden appeared first on WIRED.

Locky Ransomware Hides Inside Packed .DLL

McAfee Labs has seen a huge increase in Locky ransomware in recent months (discussed in an earlier blog). Locky is aggressively distributed via a JavaScript-based downloader sent as an attachment in spam emails. Since its first variant Locky has taken advantage of compromised domains to download its malicious executable. Show More Summary

U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love

Love is accused of hacking into many U.S. government websites, like the Federal Reserve, NASA, and FBI. The post U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love appeared first on WIRED.

Google offers enterprises Verified Access for Chrome OS devices

The API cryptographically confirms the identity of a device and the user trying to access a network service.

Security TV: Will cyber insurance change the security industry?

Security experts and sysadmins be warned, the actuaries and accountants are headed your way.

BrickHouse Security Introduces New Line of Loss Prevention Kits, Upgrades GPS Trackers, and More

Each month, in an attempt to keep our customers abreast of updates to BrickHouse Security’s ever-expanding product catalog, we’ll be highlighting some recent additions here, on our blog. Exciting Updates to GPS Services As we’ve previously...Show More Summary

An open letter to the first U.S. cybersecurity chief

Obama appointee Gregory Touhill has an opportunity to foster a substantive conversation with the public over privacy issues.

Government is hit by 9,000 security breaches a year - but reporting them remains chaotic

UK central government departments suffered 8,995 data breaches in just a year but the infrastructure isn't in place to properly report them

Volkswagen launches new cybersecurity firm to tackle car security

The automaker is partnering with Israeli cybersecurity experts to stay on top of digital threats to its vehicles.

Cybersecurity predictions for 2016: How are they doing?

We examine the frequency and scale of cyberattacks in the first half of 2016, and see whether security experts' predictions were on the money at the start of the year.

Don't get distracted by the shiny cyber machines

Threat intelligence, machine learning, and other buzzword techniques will be needed to improve our cyber defences, but don't throw out the older stuff.

Cryptocurrencies a Target for Cybercriminals, Part 1: the Risks of Innovation

All cryptocurrencies are a target for cybercriminals. Anywhere there is value, criminals, fraudsters, and charlatans will soon follow. Call it the Willie Sutton principle. Sutton, a famous bank robber in the 1920s–30s, was asked why he robbed banks. Show More Summary

Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder

The attack on the World Anti-Doping Agency, following the DNC hack, signals Russian hackers emerging from the shadows to brazenly flaunt their work. The post Anti-Doping Agency Attack Shows Russian Hackers Getting Bolder appeared first on WIRED.

A pro-Hillary Clinton PAC leaked hundreds of donors' data

Names, addresses, and donation amounts were stored in the spreadsheet.

How to squeeze more life out of your obsolete iPhone or iPad

Is iOS 10 not compatible with your old iPhone or iPad? Want to squeeze a bit more life out of the device before you upgrade?

The Quarterly Threats Report: What Does it Mean for You?

The latest edition of the Quarterly Threats Report (QTR) was released this week by McAfee Labs.  If you’re not familiar with them, McAfee Labs is our research organization tasked with researching all the latest threats that people are...Show More Summary

Donald Trump's campaign website leaks intern resumes

The resumes were stored in an unprotected Amazon Web Services bucket.

Copyright © 2015 Regator, LLC