FireEye warns group which exploited XP zero day is now using new malware and social media to trick employees.
Smart TVs Represent a Massive and Vulnerable Attack Surface
As connected TVs become mainstream, a flaw in the HbbTV standard threatens widespread chaos.
Second Chinese PLA Hacking Unit Unmasked in ‘Putter Panda’ Report
CrowdStrike intelligence alleges Unit 61486 hacked satellite firms since at least 2007
What Do We Think About Comcast Home Security
Xfinity (Comcast) is a cable and internet company. Comcast Home Security very new to the home security market but already have generated plenty of reviews. Please read them. Not the ones they may post on their own website, instead search for the rea…
Scammers Trick Thousands of Twitter Users with ‘Follower’ Bait
The Twitterverse falls for the promise of more followers.
Malvertising and Cryptowall Mark the Appearance of the RIG Exploit Kit
Since first appearing in April, RIG traffic volume continues to rise
IEEE CEO Loeb Named ISACA CEO
Former IEEE chief will bring a focus on expanding the central strategic role of the cybersecurity function.
DARPA Announces First Teams and DEF CON Colocation for Cyber Grand Challenge
The two-year competition to develop self-healing security is well on its way.
How to Integrate Security into Core Business Processes
The Information Security Forum explains how the CISO can play a key role in central business strategy.
How to Integrate Security into Core Business Processes
The Information Security Forum explains how the CISO can play a key role in central business strategy.