The Microsoft Malware Protection center is shifting its research focus away from predicting test samples and instead focussing on prevalence-weighted response and family research.
DDoS and the challenge of civil disobedience on the internet
Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.
Education Institutions at Forefront of BYOD
BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in so…
Blue Coat Systems to acquire Solera Networks
Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.
Most small businesses don’t understand mobile security threats
New research into eight critical security threats on mobile devices found the majority of small to medium enterprises (SMEs) are either unaware of or defenseless against the threats posed to their networks by mobile devices and BYOD.
The HangOver Campaign – more on Indian hackers targeting Pakistan
A few days ago details of a long-standing and wide-ranging attack primarily against Pakistan and apparently emanating from India were released. Now it appears it was just the tip of an iceberg.
Queen’s Speech and user identification through IP addresses
The reason for Her Majesty’s government to bring forward proposals viz-a-viz “the problem of matching Internet Protocol addresses” (Queen’s Speech 2013) may have as much to do with BT’s current plans as with the stalled Communications Data Bill.
Mandiant: Chinese espionage hackers are back
The group of Chinese cyber-espionage hackers reportedly operating as an arm of the People’s Liberation Army is allegedly back at it, attacking a range of US enterprise and government targets to steal everything from technology blueprints to business pl…
Password strength meters inspire better choices – but only for sensitive accounts
Password strength meters that offer web surfers a visual gauge of how weak or strong a chosen lock may be are increasingly present on websites – but how effective are they at getting folks to choose stronger options? When it comes to locking down sensi…
Snapchat’s woes escalate with complaint to FTC
First it was shown that Snapchat photos and videos on Android are not deleted, merely hidden; then a YouTube video shows how to locate Snapchat videos on iOS; and now a complaint alleging deceptive business practices has been filed with the FTC.