According to documents from Edward Snowden, more than 7% of Yahoo chat users send intimate photos taken via webcam. This is known because GCHQ stopped to count them from among their intercepts. But the concept and practice of ‘revenge porn’ should make…
RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam
As (ISC)² celebrates its 25th anniversary, the global non-profit is well underway to conducting the most extensive overhaul of the CISSP certification exam in its history. Infosecurity catches up with its executive director at the RSA Conference in San…
2014 US Cyber Challenge Kicks Off in April
The Council on Cybersecurity (CCS) has launched the 2014 US Cyber Challenge, calling on the industry and government to “get serious” about the workforce problem. The initiative aims to find 10,000 bright students and turn them into cybersecurity profes…
Lloyd’s of London Declines Infosec Cover For Energy Companies
The BBC reported yesterday that energy companies “are being refused insurance cover for cyber-attacks because their defenses are perceived as weak.” Before cover is offered, applicants must undergo a security audit by the insurance companies, but “the …
Lauri Love Accused of Hacking the Federal Reserve
In October 2013 the UK’s National Crime Agency announced that a 28-year old Briton, simultaneously identified by the FBI as “Lauri Love, 28, of Stradishall, England,” was arrested on suspicion of hacking into US Army, US military and US government comp…
Lauri Love Accused of Hacking the Federal Reserve
In October 2013 the UK’s National Crime Agency announced that a 28-year old Briton, simultaneously identified by the FBI as “Lauri Love, 28, of Stradishall, England,” was arrested on suspicion of hacking into US Army, US military and US government comp…
BitCrypt Ransomware Easily Broken
A new variant of ransomware dubbed BitCrypt has been smashed open by a pair of French researchers.
Kali Linux Metapackages
One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…
RSA Conference 2014: Intelligence Heavyweights Engage in Friendly Europe Bashing
The US is not unique among nations when it comes to its intelligence gathering abilities. “We are just better” at it than most countries, according to Richard Clarke, the former presidential counter-terrorism adviser.
RSA Conference 2014: Microsoft Does Not Put Backdoors in its Products says Charney
In his keynote at the RSA Conference in San Francisco, February 25 2014, Scott Charney, VP of Microsoft’s Trustworthy Computing Group, insisted that Microsoft has not compromised its principles in order to work with the NSA