Hackers used emails and passwords obtained elsewhere
Three New DDoS Reflection Techniques Appear in the Wild
Akamai said that the sheer volume of UDP services open to the Internet for reflection DDoS attacks is staggering.
IEEE’s Shannon Appointed White House Cybersecurity AD
He will serve the White House as assistant director for cybersecurity strategy in the National Security and International Affairs Division.
Porn Surges in 2015 to Become Number One Mobile Threat Vector
Blue Coat warns personal surfing is a corporate issue thanks to BYOD
Google Demands Changes After More Rogue Symantec SSL Certs Found
CA’s investigation did not reveal full extent of the problem
Half of US Security Pros Feel safe from Attack
Even so, 61% of respondents admitted a lack of confidence in their organization’s ability to detect advanced threats.
Arxan Expands Application Protection to Apple TV
Apple tvOS pre-installed apps use advanced cryptographic key security to prevent digital piracy and content theft.
F-Secure Leads Open Letter Against Snooper’s Charter
Dangerous encroachment on privacy and security will harm UK, say signatories
UK Government Data on Thousands For Sale on Darknet
Whitehall source claims digital identities are available for $75
Social Experiment Highlights Abysmal Security Hygiene
People click open unknown files, plug in unknown USB sticks, reuse passwords and more—especially Millennials.