Security News
US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service redirects the client to t...
If you build it, they will come. But will you be ready? Will any of us? It’s almost impossible to escape the topic of the Internet of Things (IoT). Whatever the technology conversation, the IoT see...
The second quarter of 2015 was wrought with high profile vulnerabilities and hacks. Cybercriminals became more inventive in their attack methods to infiltrate and abuse existing technologies that are ...
During Q2, ThreatMetrix examined cybercrime attacks detected during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. They analyzed more than 3 b...
The Core Infrastructure Initiative (CII), a project managed by The Linux Foundation, is developing a new free Badge Program, seeking input from the open source community on the criteria to be used to ...
The advance of artificial intelligence (AI) technologies has caught the attention of companies and institutions in a wide range of enterprise markets, and executives in almost every industry are consi...