Reuters Technology reporter Joseph Menn interviewed security expert Bruce Schneier in front of last week’s TrustyCon audience in San Francisco, where the security expert provided his analysis of the government surveillance controversy
A Guide To Google Hacking Techniques
Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it’s like a part of our daily routine.
Google hacking does not mean to hack Google’s site/server, it means likely to be smart in Google search. Almost every kind of …
Ask.fm Social Network for Teens Launches Safety Centre
As teens and tweens increasingly live their lives digitally and in an oversharing-friendly way, online safety has become a hot topic for concerned parents. Typically it’s seen as the families’ responsibility for monitoring their children’s internet and…
Hackers Replace ‘Russian’ with ‘Nazi’ on Russia Today
Russia Today (RT) tweeted Sunday, “Hackers deface http://RT.com website, crack admin access, place ‘Nazi’ in every headline. Back to normal now.” Although the hackers are not known, it could be in retaliation for the increasing number of reports descr…
Is Sears a Victim of Retail Hacking, or Retail Hacking Hysteria?
Bloomberg reported Saturday that US retail giant Sears “is investigating a possible security breach after a series of cyberattacks on other retailers have exposed the data of millions of consumers.” Sears is apparently being aided in this investigation…
SANS Announces 2014 EMEA Schedule
The SANS Institute has released its latest training and events schedule for 2014 in the Europe, Middle East and Asia regions
Is Uroburos the First Known Russian Cyberweapon?
At a time of heightened tension between Russia and the West over Ukraine, a German security firm describes a sophisticated rootkit that it suggests may have been developed by Russian intelligence services. Named after a string found in the code, Ur0bUr…
Revenge Porn: One Win (Texas), One Fail (New York)
According to documents from Edward Snowden, more than 7% of Yahoo chat users send intimate photos taken via webcam. This is known because GCHQ stopped to count them from among their intercepts. But the concept and practice of ‘revenge porn’ should make…
RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam
As (ISC)² celebrates its 25th anniversary, the global non-profit is well underway to conducting the most extensive overhaul of the CISSP certification exam in its history. Infosecurity catches up with its executive director at the RSA Conference in San…
2014 US Cyber Challenge Kicks Off in April
The Council on Cybersecurity (CCS) has launched the 2014 US Cyber Challenge, calling on the industry and government to “get serious” about the workforce problem. The initiative aims to find 10,000 bright students and turn them into cybersecurity profes…