Security News

Car Industry Three Years Behind Today’s Cyber Threats (Threatpost)
2016-03-01 05:01

Researchers say when it comes to car hacking, it's going to take three years for automakers to catch up with the number of cyber threats targeting cars.

Minimize your organization’s threat exposure with Qualys ThreatPROTECT (Help Net Security)
2016-02-29 22:02

At RSA Conference 2016, Qualys announced the Qualys ThreatPROTECT solution. Built on the Qualys Cloud Platform, ThreatPROTECT correlates data from vulnerability scans and active threat data from...

ThreatStream rebrands as Anomali, redefines threat intelligence (Help Net Security)
2016-02-29 20:30

ThreatStream changed its name to Anomali and launched two new products at RSA Conference: Harmony Breach Analytics for mid-to-large enterprises and the Anomali Threat Analysis Reports Service for...

Protecting enterprise data centers from threats that target Linux servers (Help Net Security)
2016-02-29 11:30

Today’s internet is largely powered by Linux servers, many of which have become the target of attackers looking to utilize this vast pool of resources for much larger and more aggressive...

Apple Must Forever Threat Model Against Itself (Threatpost)
2016-02-25 19:45

The ongoing dispute between the FBI and Apple has brought out the fact that Apple must be part of its own threat model going forward.