Black Hat: 9 free security tools for defense and attacking
When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also -- in the wrong hands -- to carry out...
View ArticleLargest DDoS attack ever delivered by botnet of hijacked IoT devices
Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top distributed denial-of-service...
View ArticleSecurity blogger Krebs says IoT DDoS attack was payback for a blog
Security blogger Brian Krebs says a massive distributed denial-of-service attack that took down his website last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire...
View ArticleAkamai warns: Look for IoT devices to attack during Thanksgiving, Christmas
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.In its...
View ArticleIBM sets up test range to practice fighting cybersecurity battles
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.The facility,...
View ArticleCisco scrambling to fix a remote code execution problem in WebEx
Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted...
View ArticleThat Hearbleed problem may be more pervasive than you think
That lingering Hearbleed flaw recently discovered in 200,000 devices is more insidious than that number indicates.According to a report posted by Shodan, the Heartbleed vulnerability first exposed in...
View ArticleIRS-related phishing scams seen running rampant
If this year is anything like last we are in the midst of phishers’ attempts to trick taxpayers, employers and tax preparers into giving up information that will allow attackers to file bogus tax...
View ArticleLine between cyber crooks and cyber spies getting more blurry
Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and...
View ArticleIBM’s Watson teams up with its SIEM platform for smarter, faster event detection
IBM’s Watson supercomputer can now consult with the company’s security information and event management (SIEM) platform to deliver well researched responses to security events and do so much faster...
View ArticleFortinet upgrades for better cloud, SD-WAN protection
Fortinet has rolled out a new version of its FortiOS operating system that gives customers the ability to manage security capabilities across their cloud assets and software-defined wide area...
View ArticleResearchers add software bugs to reduce the number of… software bugs
Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into...
View ArticleWaratek upgrades Java protection
Waratek is introducing a feature to its Java-protection platform that enables upgrading to the current version of Java without having to install Java updates or touch the apps running within the Java...
View Article5 core topics Trump needs to address in Silicon Valley leaders meeting
As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could...
View ArticleTrend Micro: 6 most popular homebrewed terrorist tools
Terrorists are developing and distributing encryption tools that protect privacy of their communications, as well as other homegrown apps that include a news-feed compiler and DDoS attack software,...
View Article