News
Cisco to give away $300K in ‘Internet of Things’ security contest
Cisco has announced the start of the “Internet of Things Grand Security Challenge” in which programmers can create apps to help solve security issues around web-connected ‘things.’
Read MoreVisitors beware: you can and likely will get hacked at the Sochi Olympics
An addition to the problems surrounding the Sochi Olympics—NBC has discovered that Games’ participants and spectators will most likely get hacked instantly upon arrival to Russia.
Read MoreSyrian Electronic Army hijacks eBay and PayPal
Famed ‘hacktivist’ group Syrian Electronic Army claims to have hacked eBay and PayPal Saturday. Visitors of the eBay and PayPal UK websites were redirected to defacement pages, but the group said the point of the DNS hack was not to steal users’ information.
Read MoreParticipants, including marketer OWASP, back out of RSA conference
Speakers and organizations have begun to back out of next month’s annual RSA security conference amid reports of RSA’s shady new deal with the NSA.
Read MoreTarget faces second largest credit card hack in U.S.
Shoppers may be hesitant to head to Target this holiday season, after an estimated 40 million credit and debit card accounts may have been compromised after a data breach occurring between Nov. 27 and Dec. 15, 2013.
Read MoreDefense against APTs: technology plus education
Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.
Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.
Read MoreGovernment shutdown impact on information security
The first government shutdown in 17 years will undoubtedly put federal information security to the test.
Read MoreWeb Application Security on the rise as 2013 comes to an end
Almost a third of all security breaches are against web applications, and web applications and databases have the most records compromised yearly. So why aren’t applications being better protected?
Read MoreFBI behind Tor malware attack to bust child porn activity
After serious speculation, the FBI finally admitted that it covertly took control of Freedom Hosting in July in order to identify the ultra-anonymous hosting provider’s users.
Read MoreSecurity B-Sides Los Angeles: Discover the Next Big Thing
Security B-Sides Los Angeles presented a fun and educational opportunity for the local information security community to engage in open conversation over several relevant topics.
Read More