AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.
NSS Launches Cyber Resiliency Center
The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.
Black Hat 2014 Keynote: What InfoSec Needs to Do
Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.
Google’s Gmail Scanning Leads to Arrest of Convicted Child Sex Offender
Web giant claims it doesn’t scan for any other signs of illegal activity.
Fake MH17 Video Page Leads to Bloatware
The scam leads users to a minefield of potentially unwanted programs.
Poweliks Malware Hides in Registry to Evade AV Tools
Traditional security will not find this new threat, experts warn.
Poweliks Malware Hides in Registry to Evade AV Tools
Traditional security will not find this new threat, experts warn.
IcoScript RAT Hides Behind Yahoo! Email Addresses
The malware went undetected for years thanks to clever camouflage.
BlackHat USA 2014: Multi-factor Authentication Tackles BYOD Complexity
Authentify offers prioritization for biometrics and other authentication mechanisms.
Israeli Spies Tapped John Kerry’s Phone Calls – Report
Intelligence services eavesdropped on secretary of state during key peace talks, according to a German report.