Google’s Safe Browsing Tool, used by Chrome, Firefox and Safari to protect users from sites serving malware, yesterday blocked php.net, home of the hugely popular open-source PHP programming language.
(ISC)² Names Inaugural Winners of USA Cyber Warrior Scholarships
The (ISC)² Foundation, the nonprofit charitable trust of (ISC)², today announced the inaugural recipients of the 2013 USA Cyber Warrior Scholarship, a program developed in partnership with Booz Allen Hamilton to help close the cybersecurity workforce g…
More Network Solutions Problems: Bouncing Emails and Website Outages
Network Solutions has had more than a few problems recently. In July a DDoS attack affected some of its servers; this was followed by internal MySQL problems. Then came the DNS hijack affecting some major customers earlier this month.
SMS Spam Report Highlights Football Betting and Payday Loan Spam
Payday loans and sports betting – the latter hitting new heights with the start of the football season – are behind the majority of messaging spam received in the UK.
A DDoS Attack Could Cost $1 Million Before Mitigation Even Starts
A new report suggests that companies are unaware of the extent of the DDoS threat, unaware of the potential cost of an attack, and over-reliant on traditional and inadequate in-house defenses.
SQL Injection and Cross-site Scripting Attacks Surge in Q3
Cross-site scripting (XSS) and SQL injection activity is up 32% in the third quarter, as those with malicious intent look to specifically target web-facing and cloud applications carrying sensitive information about organizations and their customers.
UN Nuclear Agency Computers Infected with Malware
The International Atomic Energy Agency (IAEA) has admitted that some of its computers have been infected with malware for at least the last few months, but denies that any sensitive data regarding its nuclear inspections has been compromised.
Google and Arbor Networks Team Up on DDoS Digital Attack Map
Distributed denial-of-service (DDoS) attacks are getting more frequent and harder to detect. To help companies keep up with daily threat levels, Arbor Networks has collaborated with Google Ideas to create a data visualization map of global attacks.
Consumers Take Their Business Elsewhere After a Data Breach
The costs of data breaches have been well-documented when it comes to remediation and consulting costs, but the more qualitative fallout from a breach, like the impact to brand identity, is harder to pin down.
European Civil Liberties Committee Approves Current Draft Data Protection Regulation
Edward Snowden’s leaked information on the character and extent of NSA surveillance brought new impetus to the European Commission’s proposed new General Data Protection Regulation, which had been floundering under the weight of extensive US government…