- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Incident Response
A week into the Sony hack, however, there is a lot of rampant speculation but few solid facts. Here’s a look at what we do and don’t know about what’s turning out to be the biggest hack of the year.
The post Sony Got Hacked Hard: What We Know and Don’t Know So Far appeared first on WIRED.
Entrepreneurs are addressing the need for tighter corporate security, but skewed valuations are making it more difficult to determine which companies are a safe bet. Continue reading
The breach exposed two things the movie industry loathes — the piracy of films and details about executive compensation — and sent a ripple of dread across Hollywood.
Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading
Jelle Martens Eight years ago, Polish hacker Joanna Rutkowska was experimenting with rootkits—tough-to-detect spyware that infects the deepest level of a computer’s operating system—when she came up with a devious notion: What if, instead of putting spyware inside a victim’s computer, you put the victim’s computer inside the spyware? At the time, a technology known […]
The post How Splitting a Computer Into Multiple Realities Can Protect You From Hackers appeared first on WIRED.
From the department of face-palming opsec blunders. Continue reading
High tech firms have been offering bounties to security researchers to find holes and bugs in their software, but these reward programs haven’t drawn much interest from major banks. Continue reading
Refurbished BlackEnergy does Windows and Linux—even Cisco routers. Continue reading
Service uses Azure RemoteApp to run the browser in the cloud. Continue reading
30 September 2014- Gizmodo Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word
24 September 2014- The Verge Worse than Heartbleed? Today’s Bash bug could break security for years
30 September 2014- MIT technology review Why the Shellshock Bug Is Worse than Heartbleed
19 August 2014- ThreatPost U.S. Nuclear Regulator Hacked Three Times in Three Years
11 September 2014- Defense News Army Cyber Chief: Let’s Get Closer To Industry
3 September 2014- Krebs on Security Data: Nearly All U.S. Home Depot Stores Hit