I just spent a fair bit of time preparing to take the GIAC Security Expert exam as part of the requirement to recertify every four years. I first took the exam in 2012, and I will tell you, for me, one third of the curriculum is a “use it or lose it” s…
Trend Micro: Fake Apple iOS Apps Are Rampant
The Apple iOS environment is riddled with malicious fake apps, signed with enterprise certificates.
IoT Control Wins Trusted Environment Hackathon
SafeHaven, a system for granular control of IoT devices in smart homes, has won Trusted Execution Environment (TEE) hackathon.
5 Reasons Trump Might Not Increase Defense Spending
Loren Thompson, TNI Donald Trump is so forceful in his public presence and pronouncements that many observers simply assume he would be a decisive commander in chief. However, being decisive…
Cyberbit Range Offers Simulated Attack Training
The Cyberbit Range provides lifelike simulation for security operations trainees—kind of like the holodeck, in Star Trek.
Converse E-Commerce Site Hacked for Payment Info
The Australian online site for the iconic sneaker brand was compromised for more than a month.
Most Americans Believe a Tech-Enabled Terrorist Attack is Imminent
58% of participants under 30 believed that a technology-based terrorist threat was imminent.
IT Admins Urged to Patch Critical Industrial Control Flaw
Bug could allow hackers to physically control equipment
Security Boost as Google Makes Certificate Transparency Mandatory
CT is designed to help prevent abuse of SSL cert system
45% of Consumers Are Victims of Cybercrime
The most common type of attack that consumers fall victim to are false requests to reset social media account passwords.