Attackers Ramp Up Threats to the Energy Sector

The US energy sector experienced the largest number of malware attacks of any industry in the spring and summer of 2012, with the end result being expensive outages at pipelines, oil refineries and drilling platforms. This year, brute-force attacks and…

Read More >>

Building Security In Maturity Model: Version 5 Released

BSIMM-V is effectively a scorecard that can be used by companies to either measure or improve their existing software development security stance. It is not a ‘standard’ in the regulatory sense; it more a practical description of actual best practices.

Read More >>

Adobe Breached Users Now Estimated at 38 Million

When news of the Adobe breach emerged at the beginning of October, the company admitted that bank card and other personal information on 2.9 million users had been stolen together with usernames and passwords for an undisclosed number of customers. Tha…

Read More >>

Researchers: LinkedIn Intro is a Man-in-the-Middle Attack

LinkedIn has released a new product called Intro, which shows users’ LinkedIn profiles from inside the native iPhone mail client. Members can, at-a-glance, see the profile picture of the person who’s emailing, learn more about their background, and con…

Read More >>