Cisco researchers claim network is far more extensive than first thought.
FBI’s Quest to Pierce Tor Could Open the Door to Foreign Surveillance
The Feds want to amend a rule that would allow remote search and seizure of data–with wide-ranging implications for unilateral action overseas.
Bottom Line Woes: Financial Sector Struggles with Federal Security Regulations
Federal regulations aimed at keeping financial firms safer are hitting companies’ bottom lines hard—but no one’s really complaining.
ISF Maps NIST’s Cybersecurity Framework
The ISF has released the latest version of the Standard of Good Practice, incorporating the framework’s language.
Former Home Depot IT Staff Slam Firm’s Infosecurity Stance
DIY chain didn’t pay enough heed to data security, say ex-staffers
Celebs Exposed Again as Hacked Photos Emerge Online
Round two spells more embarrassment for female celebrities
Google’s DoubleClick hijacked to spread malicious ads
Malvertisers infect unsuspecting netizens who are running out-of-date software
End of an Icon: Microsoft Axes Trustworthy Computing
After 12 years of leading the discussion on trustworthy computing, the group will become a casualty of the post-PC era.
White Hat Rally sets off for Amsterdam for Barnardo’s
Participants in this year’s White Hat Rally set off from Folkestone in the early hours of this morning to begin their adventure into the unknown.
NATO Steps Up Private Sector Co-operation with New Alliance
NATO Industry Cyber Partnership will boost best practice sharing