Hi, what are you looking for?
A threat to target the Internet’s root Domain Name System (DNS) servers and knock the Internet offline may be more difficult than the hackers think. Hackers reputedly associated with Anonymous made the threat to launch what they dubbed “Operation Global Blackout” March 31 in response to actions by Wall Street, the Stop Online Piracy Act (SOPA) and “irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs.”
LOIC DDoS Attack Tool Now Available for Google Android Devices
Russia’s political season is heating up. Here in America, we have Super PACs, skewed election coverage, and scandals. As it turns out, Russia has some of that too -- perhaps politics and fighting among party lines is somewhat universal. The difference however, is that we’re not seeing the types of Internet-based activism in America that exists in Russia. Furthermore, when political powers enforce their might in America, it’s a bit more subtle.
Earlier this month, Trustwave had a change of heart and reversed a decision to issue subordinate certificates that allowed a private company the ability to impersonate virtually any domain on the Web. Those actions have led Mozilla to clarify its stance on the issue, and offer one final warning to any company seeking to offer the same business services that Trustwave walked away from.
Defendant Allegedly Sought to be Associated with an Armed Extremist Group, Believed He Would Take Part in al-Qaeda AttackOn Friday, the Department of Justice said that FBI agents had arrested a man for allegedly attempting to detonate a bomb in a planned suicide attack on the U.S. Capitol Building.
In college, I took a required Computer Science class called “Systems Principles”. My professor started the class by listing out the seven key components in a successful system/program development process:1. Requirements2. Specifications3. Design
The Federal Trade Commission and the Bureau of Consumer Protection were attacked by AntiSec Thursday and into Friday, in response to their support and participation in ACTA, the Anti-Counterfeiting Trade Agreement, and issues with Google’s recent privacy policy changes.
Researchers at Panda Security have uncovered a botnet that not only swipes financial information, but also goes after rival malware.PandaLabs, the company’s research arm, recently detected a new bot called Ainslot.L targeting Windows machines. The malware’s primary job is to log user activities, download additional malware to take control of the system and steal log-in information related to online banking sites. But as a side bonus, the malware goes on a seek-and-destroy mission targeting other bots, including Zeus and DarkComet.
Trend Micro today announced that is has open sourced the code to its popular free security tool, HijackThis. The tool scans systems to find settings that may have been modified by spyware, malware or other programs that have wiggled their way onto a system and caused problems.
In addition to being a renowned theoretical physicist, Albert Einstein was also quite a wizard at writing security procedures and processes.
Researchers at Symantec have uncovered a fake app store for Google Android that is hosting malware designed to bilk users out of big bucks.According to Symantec, mobile malware scammers have created the fake market to host various applications that are actually Trojans used for SMS fraud.
IT Managers Aren’t The Only Ones Aware of The BYOD Trend – Attackers are Too! Is Your Security Strategy Ready?This article is the third installment in my “firewall” series. (Read Part I, Part II)
In response to the increase in attacks on industrial control systems that power utilities, industries and critical infrastructure systems, Norway-based Norman ASA is launching a product designed to protect SCADA (supervisory control and data acquisition) systems against cyber attacks from malware such as trojans, worms and viruses—ones like stuxnet.
The Hands-off Approach to Monitoring and Managing Threats that Transit an ISP’s Network is Putting Businesses and Government at Risk.
FBI Director Pays Visit to Thank Latvian and Estonian Officials for Their Cooperation in Operation Ghost Click, Looks for Future Cooperation
FishNet Security today launched a new cloud-based threat monitoring and response service aimed at helping businesses log information security events across multiple sources, reduce data leakage, and proactively respond to emerging threats and meet regulatory requirements.