Security News
Unnoticed for years, malware turned Linux and BSD servers into spamming machines (Help Net Security)
For over 5 years, and perhaps even longer, servers around the world running Linux and BSD operating systems have been targeted by an individual or group that compromised them via a backdoor Trojan, th...
Active spam campaigns delivering fake notices about temporarily locked accounts have been spotted in the last few days delivering a deadly malware combination: the Dalexis downloader and the CTB-Locke...
If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against ...
http://www.computerworld.com/article/2916895/encryption/lawmakers-criticize-fbis-request-for-encryption-back-doors.html By Grant Gross IDG News Service April 29, 2015
http://www.csoonline.com/article/2917674/data-breach/hard-rock-hotel-and-casino-suffers-data-breach.html By Dave Lewis Brick of Enlightenment CSO April 30, 2015
http://krebsonsecurity.com/2015/05/harbortouch-is-latest-pos-vendor-breach/ By Brian Krebs Krebs on Security May 1, 2015
http://www.defenseone.com/technology/2015/04/how-pentagon-could-soon-share-americans-data-with-foreign-militaries/111553/ By Patrick Tucker Defense One April 30, 2015
https://www.irishtimes.com/news/crime-and-law/ryanair-falls-victim-to-4-6m-hacking-scam-via-chinese-bank-1.2192444 By Ciarán Hancock The Irish Times 4/29/2015
Are these words too difficult for you? Basilisk, snuffleupagus, supercalifragilisticexpialidocious, Quidditch, Oompa Loompa. I hope not! They’re all part of the magical world of children’s literature.
In this podcast recorded at RSA Conference 2015, Siva Belasamy, CEO and CTO at Deep Identity, talks about how identifying who has access to what, and the risks associated with such access, can be a da...