By the numbers, Akamai’s scale, reach and ability to help brands connect users to immersive and immediate online experiences while protecting their businesses from threats, is quite impressive. While I’m proud that Akamai connects with billions of devi…
Low, Medium and High Interaction Honeypot Security
Honeypots are a popular way to protect data centers and learn about attackers. Learn the difference between high and low interaction honeypot security.
EU Launches Bug Bounty for 15 Open Source Projects
The European Commission will award bounties in the third round of its free and open source software audit.
Terrified PewDiePie Hacker Bids Dramatic Farewell
After targeting Chromecast, TheHackerGiraffe grew scared of getting caught.
Website of Dublin Tram Service, Luas, Hacked
The attacker is demanding a payment of one Bitcoin within five days.
Hackers Threaten to Release 9/11 Data ‘Trove’
Experts sound note of caution as extorters ramp up the hyperbole
PewDiePie Hackers Take Aim at Chromecast TVs
Users urged to switch off UPnP in latest campaign
Password Manager Users Exposed After Privacy Snafu
Abine admits millions of Blur customers may have been affected
Third Party Accessed Victorian Government Directory
Work details of 30,000 Victorian government employees was stolen in the data breach.
Cybersecurity Guidelines Released for Healthcare
The Department of Health and Human Services released voluntary cybersecurity best practices for the healthcare sector.