Contact
University of the Aegean
Department of Information and Communication Systems Engineering
Info Sec Lab
Laboratory of Information & Communication Systems Security


Older News
13-09-2015
Cyber Security Review
13-09-2015
Apple Updates "Sideloading" Process in iOS 9 to Boost App Security
13-09-2015
New Android Ransomware Changes Device's PIN Lock
13-09-2015
Industry Reactions to U.S. Department of Energy Cyberattacks: Feedback Friday
29-08-2015
Cyber Security Review
29-08-2015
BitTorrent Details Method Used to Prevent DRDoS Attacks
29-08-2015
Six Alleged Users of LizardStresser DDoS Service Arrested in UK
29-08-2015
US Appeals Court Reverses Ruling on NSA Snooping
12-08-2015
Firefox 40 Patches Vulnerabilities, Expands Malware Protection
12-08-2015
Hackers Profited $100 Million by Hacking Newswires: SEC
12-08-2015
US Busts Hacking/Insider Trading Ring
03-08-2015
Fake Windows 10 Upgrade Emails Hide Ransomware
03-08-2015
Flaw in Fingerprint Access Devices Could Make It Easy to Open Doors
03-08-2015
Cisco Patches DoS Vulnerability in ASR Routers
30-07-2015
Anthem Hackers Targeted Multiple Industries Since 2012: Symantec
30-07-2015
Russian Hacker Tool Uses Legitimate Web Services to Hide Attacks: FireEye
30-07-2015
Americans Want Government to React to Nation-State Cyberattacks: Survey
19-07-2015
Andromeda Botnet Used to Deliver New GamaPoS Malware
19-07-2015
Eaton Patches TCP/IP Stack Flaw Affecting Controls, Relays
19-07-2015
South Korea Intelligence Official Dead in Hacking Scandal
14-07-2015
Six Nigerians Extradited to US for Alleged Internet Scams
14-07-2015
TeslaCrypt 2.0 Ransomware Comes With Improved Encryption Mechanism
14-07-2015
Security Bugs Patched in Kaseya VSA Management System
11-07-2015
Chinese APT Group Uses Hacking Team’s Flash Player Exploit
11-07-2015
Deception-Based Security Startup TrapX Raises $9 Million
11-07-2015
Google Uses Artificial Neural Network to Detect Sneaky Spam
07-07-2015
Malicious Version of BatteryBot Pro App Found on Google Play
07-07-2015
Command Injection Vulnerabilities Found in AirLive IP Cameras
07-07-2015
Department of Defense Concludes Three-Weeks of Cyber War Games
04-07-2015
Picture-Based Malware Coming Soon to a Screen Near You
04-07-2015
SurfWatch Labs Rolls Out Dark Web Intelligence Service
04-07-2015
Malware Abuses Android Accessibility Feature to Steal Data
04-07-2015
Mozilla Patches Critical Vulnerabilities With Release of Firefox 39
29-06-2015
Honeywell, Intel Team on Industrial Cyber Security
29-06-2015
Flash Player Flaw Used by APT3 Group Added to Magnitude Exploit Kit
29-06-2015
Many Organizations Using Oracle PeopleSoft Vulnerable to Attacks: Report
16-06-2015
Your Cars Are at Security Risk, Warns Kaspersky
15-06-2015
Red Lion Working on Fix for Old N-Tron Industrial Wireless AP Flaw
15-06-2015
Union Says Hackers Got Sensitive Data on All US Govt Staff
15-06-2015
US Says Confident No Security Breach in Iran Talks
10-06-2015
VMware Fixes Critical Security Issues in Workstation, Fusion, Horizon View
10-06-2015
European Authorities Arrest 49 Suspected Members of Cybercrime Ring
10-06-2015
Duqu 2.0 Attack Hits Kaspersky Lab, Venues Tied to Iran Nuclear Talks
31-05-2015
Murky Future for NSA Data Sweep as 'Sunset' Looms
31-05-2015
Number of Botnet-Powered DDoS Attacks Dropped in Q1: Kaspersky
31-05-2015
Belgium Probes Germany Spying Claims
22-05-2015
Security Questions Don't Offer as Much Protection as Web Users May Hope: Research
22-05-2015
Cybercriminals Use SVG Files to Distribute Ransomware
17-05-2015
Feedback Friday: Industry Reactions to VENOM Vulnerability
17-05-2015
Penn State University Cuts Internet After Chinese Cyberattack
17-05-2015
German Spy Agency 'Helped US Find Bin Laden': Report
12-05-2015
Attackers Hide Malicious Macros in MHTML Documents
12-05-2015
US Cyber Commander Says Hackers to 'Pay a Price'
09-05-2015
Adobe to Patch Critical Vulnerabilities in Reader, Acrobat
09-05-2015
Former US Govt Employee 'Tried to Sell Nuclear Secrets'
09-05-2015
Where is the Android DDoS Armageddon?
05-05-2015
UC Berkeley Hit by Data Breach
05-05-2015
Russian Spies Target Ukraine Military
05-05-2015
Researchers Keep Finding Bugs in Google’s Password Alert Extension
01-05-2015
MySQL SSL/TLS Connections at Risk Due to BACKRONYM Flaw
01-05-2015
Berlin Deleted '12,000 NSA Spying Requests'
01-05-2015
Alleged hacking group creates videos to threaten Cape Police
28-04-2015
Mass Email Service SendGrid Confirms Data Breach
28-04-2015
Europol, Italian Police Roll up Internet Scam Gang
28-04-2015
Antivirus Software Weakens HTTPS Security: Researcher
21-04-2015
Vatican website hacked again over Pope’s Armenian Genocide remarks
19-04-2015
Mojang Updates Minecraft to Patch Server Crash Vulnerability
19-04-2015
Teenagers Suspected of Hacking Belgian and French Websites
19-04-2015
Russian Hackers Used Two Zero-Days in Recent Targeted Attack: FireEye
16-04-2015
Oracle Security Update Contains Critical Patches for MySQL, Java SE
16-04-2015
Efforts to strengthen Pentagon security workforce delayed until 2018
16-04-2015
Target expected to pay $20 million to MasterCard for breach
13-04-2015
Siemens Patches DoS, Other Vulnerabilities in SIMATIC HMI Products
13-04-2015
Security Analytics Firm Niara Raises $20 Million
13-04-2015
Hackers Attack Belgian Press Group, Second in Days
13-04-2015
FireEye Uncovers Decade-Long Cyber Espionage Campaign Targeting South East Asia
31-03-2015
UK Online Banking Fraud Jumps 50% in 2014
31-03-2015
Google on the Hook for UK Lawsuits over Secret Tracking
31-03-2015
Beijing May Target Foreign Websites in New DDoS Campaign
29-03-2015
Critical Vulnerability Impacting Hotel Wifi Networks Uncovered
29-03-2015
Schneider Electric Fixes Vulnerabilities in HMI Products
29-03-2015
Nigerian Electoral Commission Website Hacked
23-03-2015
DLL Hijacking Flaws Found in Rockwell Automation’s FactoryTalk
23-03-2015
Vulnerability Found in Yoast’s Google Analytics WordPress Plugin
23-03-2015
Cisco IP Phones Vulnerable to Eavesdropping
17-03-2015
Researcher to Reveal Mac OS X DLL Hijacking Attack
17-03-2015
Microsoft Targets Code Hijacking With Release of EMET 5.2
17-03-2015
IT Firm Baits Hackers with Online Model Train Set
05-03-2015
Financial Malware Fell in 2014 As Takedown Operations Have Impact
05-03-2015
ShareLaTeX Fixes Remote Command Execution Vulnerability
05-03-2015
Identity Fraud Cost U.S. Consumers $16 billion in 2014
26-02-2015
Feds Offer $3 Million for GameOver Zeus Mastermind
26-02-2015
APT Sophistication Outstripping Cyber-preparedness
26-02-2015
Kaspersky Tackles Critical Infrastructure with Embeddable System
26-02-2015
Ramnit Botnet Brought Down in Joint Operation by Police, Security Researchers
13-02-2015
Facebook Patches Graph API Bug That Allowed Attackers to Delete Victims' Photos
13-02-2015
Alleged Hacker Using Gozi Malware Extradited From Latvia to US
13-02-2015
Popular Android Dating Apps Put Corporate Data at Risk: IBM
06-02-2015
SEC Examines Response From Financial Advisory, Brokerage Firms to Cyber Threats
06-02-2015
Zero-Day Flaw in WordPress Plugin Used to Inject Malware into Sites
06-02-2015
Number of Flaws Patched by Microsoft Increased in Last 5 Years: Tripwire
29-01-2015
LightCyber Enhances Magna Breach Detection Platform
29-01-2015
Schneider Electric Fixes Potential RCE Flaw in Several Products
29-01-2015
DDoS-For-Hire Services Market Leads to Boom in DDoS Attacks: Akamai
22-01-2015
Google Fixes 62 Security Bugs With Release of Chrome 40
22-01-2015
Adobe Investigating Flash Player Zero-Day Found in Angler Exploit Kit
22-01-2015
China Has Never Asked Huawei to Spy: CEO
17-01-2015
False Positive Alerts Cost Organizations $1.3 Million Per Year: Report
17-01-2015
Canada Prohibits Installation of Software, Updates Without Consent
17-01-2015
Hackers Announce 'World War III' on Twitter
12-01-2015
Understanding Cryptography
11-01-2015
ASUS Routers Plagued by Command Execution Vulnerability
11-01-2015
Microsoft Dynamics CRM Affected by Self-XSS Vulnerability: Researchers
11-01-2015
Feedback Friday: Is North Korea Behind the Sony Hack?
08-01-2015
US Spymaster Dined With North Korea General Responsible for Sony Hack
08-01-2015
Attackers Spread Dridex Banking Trojan Via Malicious Macros
08-01-2015
Pro-Russian Hackers Claim Attack on Merkel's Website
04-01-2015
Data Breach Concerns With “Smart Vehicles” Shift Into Overdrive by Todd Rowe
04-01-2015
Boards Dissatisfied With Cyber, IT Risk Info Provided by Management
04-01-2015
US Slaps Sanctions on North Korea After Sony Hack
04-01-2015
3 REASONS WHY OPEN SOURCE MEANS BETTER SECURITY
01-01-2015
Top Cybersecurity Headlines of 2014
01-01-2015
Android Malware Increasingly Packaged With HTML5 Apps: Trend Micro
01-01-2015
FBI Looking to Hire Cyber Experts
28-12-2014
South Korea Says Nuclear Reactors Safe After Cyber-attacks
28-12-2014
China a Likely Factor in North Korea Cyber Prowess: Experts
28-12-2014
North Korea Calls Obama 'Monkey', Blames US for Blackout
24-12-2014
New Security Guidelines For Online Payments in the EU
24-12-2014
South Korea Heightens Cyber Security Watch on Hacking
24-12-2014
JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication
24-12-2014
RSA Report Dives Deep into Backoff PoS Malware
19-12-2014
Researchers ID New Variant of Alina PoS Malware
19-12-2014
Sony Hack a 'Serious National Security Matter': White House
19-12-2014
"USBdriveby" Emulates Mouse and Keyboard to Hijack Computers
14-12-2014
Indian Police Arrest 'Jihadi Tweeter'
14-12-2014
Buffer Overflow Vulnerability Found in FreeBSD
14-12-2014
Malwarebytes Anti-Exploit Upgrade Mechanism Vulnerable to MitM Attacks
11-12-2014
Charge Anywhere Admits Breach May Have Given Hackers Access for Five Years
11-12-2014
Vectra Networks Updates Threat Detection Platform
11-12-2014
Kleiner Perkins Leads $8 Million Investment in Area 1 Security
11-12-2014
Hacking Threatens Airline Safety: Aviation Chiefs
06-12-2014
Exploit Payload Possibly Made It Onto NASA's Orion Spacecraft
06-12-2014
Sony Hackers Dump Personal Data on 47,000 People, Celebs Included
06-12-2014
Hackers Threaten Sony Staff in New Email
06-12-2014
Exploit Payload Possibly Made It Onto NASA's Orion Spacecraft
06-12-2014
Sony Hackers Dump Personal Data on 47,000 People, Celebs Included
06-12-2014
Industry Reactions to Devastating Son
02-12-2014
XSS Vulnerability Found in Alcatel-Lucent Carrier-Grade Switches
02-12-2014
US Authorities Warn Military About Social Media Risks
02-12-2014
Security Researcher Creates Database of Whitelisted ICS/SCADA Files
28-11-2014
ENISA Issues New Guidelines for Cryptographic Solutions
28-11-2014
Reading the Tea Leaves on Cybersecurity Regulation
28-11-2014
Global quantum communications—no longer the stuff of fiction?
26-11-2014
Sony Pictures Hack Shuts Down Network
26-11-2014
Fraud Transactions to Jump as e-Commerce Spikes
26-11-2014
Adobe Releases Out-of-Band Patch for Flash
23-11-2014
WordPress 4.0.1 Released to Address Critical XSS, Other Vulnerabilities
23-11-2014
Siemens Fixes Critical Vulnerabilities in WinCC SCADA Products
23-11-2014
Backdoored CMS Plugins Used to Hijack Web Servers
15-11-2014
Mobile Pwn2Own 2014: iPhone 5s, Galaxy S5, Nexus 5, Fire Phone Hacked
15-11-2014
BlackBerry Unveils New Enterprise Security, Mobility Solutions
15-11-2014
Internet Voting Security Risks Highlighted by New Wireless Router Attack
10-11-2014
N.C. Dermatology Center Discovers Hacked Server Two Years After Attack
10-11-2014
Darkhotel Attackers Target Business Travelers via Hotel Networks
10-11-2014
How Did The FBI Break Tor?
06-11-2014
Google Releases Tool For Finding TLS/SSL Vulnerabilities and Misconfigurations
06-11-2014
Microsoft Launches Antimalware for Azure Cloud Services and Virtual Machines
06-11-2014
Stealthy Phishing Tactic Targets Online Shoppers
02-11-2014
Pirate Bay Co-founder Jailed in Denmark
02-11-2014
iOS App Vulnerability Exposed GroupMe Accounts
02-11-2014
Feedback Friday: Hackers Infiltrate White House Network - Industry Reactions
29-10-2014
Securing a billion-dollar business
29-10-2014
US-CERT Warns Dyre Malware Used in Phishing Attacks
29-10-2014
FireEye Links Russia to Cyber Espionage Campaign Dating Back to 2007
26-10-2014
NSA-Approved Samsung Knox Stores PIN in Cleartext
26-10-2014
POODLE attack digs up downgrade flaw in TLS
26-10-2014
US Govt. probes medical devices for cyber flaws
24-10-2014
1.2 Million Networking Devices Vulnerable Due to NAT-PMP Issues
24-10-2014
NIST Seeks Comment on Hypervisor Security Guide
24-10-2014
DHS Investigating Cybersecurity Flaws in Medical Devices
24-10-2014
Malvertising Campaign Infected Visitors to Yahoo, Other Sites With Ransomware
19-10-2014
FBI Renews Call for Wider Wiretap Powers
19-10-2014
DTM Component Vulnerabilities Expose Critical Control Systems to Cyberattacks
19-10-2014
Researchers Hide Android Applications in Image Files
15-10-2014
Android Worm Masquerades as Google App
15-10-2014
Reflected File Download: New Attack Vector Enables File Downloads Without Upload
15-10-2014
Dropbox Denies It Was Hacked, Says Passwords Stolen From Other Services
10-10-2014
IBM Products Vulnerable to ShellShock
10-10-2014
2014 ICS Cyber Security Conference: Register Today to Hold Your Spot
10-10-2014
Critical Vulnerability Found in Cuckoo Sandbox
05-10-2014
Palo Alto Networks, NSS Labs Spar Over NGFW Test Results
05-10-2014
Google Patches Second "Same Origin Policy" Bypass Flaw in Android Browser
05-10-2014
US States Probe JPMorgan Data Theft
02-10-2014
Google Promises More Money For Chrome Vulnerabilities
02-10-2014
Chinese Government Suspected of Using iOS, Android RATs Against Protesters
02-10-2014
Europol Analyzes Cybercrime Services Industry
27-09-2014
Video: Watch The Shellshock Vulnerability Being Exploited in Action
27-09-2014
Bash 'Shellshock' Vulnerability Under Attack
27-09-2014
US Banks Get Serious on Security Information Sharing
27-09-2014
Weak Healthcare Sector Under Siege from Insider Threats, APTs
24-09-2014
Massive Malvertising Network is 9 Times Bigger Than Originally Thought: Cisco
24-09-2014
Official jQuery Website Abused in Drive-by Download Attack
24-09-2014
2014 ICS Cyber Security Conference: Register Today to Hold Your Spot
21-09-2014
Feedback Friday: 56 Million Payment Cards Compromised in Home Depot Breach - Industry Reactions
21-09-2014
Popular English-Language Israeli News Sites Hit by Malvertising Attack
21-09-2014
Tech Giants, Researchers Team Up for "Simply Secure" Initiative
19-09-2014
Online Piracy Thrives in Internet Cloud: Study
19-09-2014
Apple's New Encryption to Lock Out Government
19-09-2014
OWASP Releases New Testing Guide
17-09-2014
Tinba Banking Malware Expands Target List
17-09-2014
JPMorgan Shares Information on Recent Cyber Attacks
17-09-2014
Visual Basic Malware Continues Resurgence
14-09-2014
Chinese Attack Groups Operate in Parallel in Cyber Espionage Campaigns: FireEye
14-09-2014
Home Routers Hijacked via Compromised Websites
14-09-2014
Cybercriminals Target Steam Users with New Trojan
10-09-2014
Vendor Fixes Vulnerabilities in Wireless Traffic Sensors
10-09-2014
OpenSSL Details Internal Handling of Security Issues
10-09-2014
Google to Sunset SHA-1 Crypto Hash Algorithm
06-09-2014
HealthCare.gov Server Hacked, Infected With Malware
06-09-2014
70 Percent of IoT Devices Vulnerable to Cyberattacks: HP
06-09-2014
Worldwide Spending On Information Security To Surpass $70B By End Of 2014: Report
03-09-2014
Namecheap Says Accounts Accessed With Credentials Stolen by Russian Hackers
03-09-2014
Apple Says No iCloud Breach in 'Targeted' Hack Against Celebrities
01-09-2014
DoE Sinks $3M into Quantum Encryption
01-09-2014
20% Report Child Sex Abuse Downloads at Work
01-09-2014
US Cyber-Warriors Battling Islamic State on Twitter
31-08-2014
Google chairman sees future of 'unbreakable' encryption
31-08-2014
Feedback Friday: JPMorgan Targeted in Alleged Russian Cyberattack - Industry Reactions
31-08-2014
Many Wi-Fi Connections in Brazil Vulnerable to MitM Attacks: Researcher
31-08-2014
97,000 Bugzilla Testers' Data Dumped on Public Server
27-08-2014
Singapore Boosts Cyber Security After Hacking Incidents
27-08-2014
Short-Lived Websites Provide Cover for Malicious Activity: Blue Coat
27-08-2014
Google Patches 50 Security Vulnerabilities in Chrome Browser Update
25-08-2014
Sony PlayStation network brought down by a DDoS attack and President’s Plane diverted
25-08-2014
Feedback Friday: Heartbleed Exploited in Theft of 4.5M Patient Records - Industry Reactions
25-08-2014
Secret Service: Over 1,000 Business Infected With "Backoff" Point-of-sale Malware
25-08-2014
Philippines Hunts New Suspects in New 'Sextortion' Ring
21-08-2014
Hacking Into Traffic Lights With a Plain Old Laptop Is Scary Simple
21-08-2014
'Machete' Cyber Espionage Attacks Target Spanish-Speaking Countries
21-08-2014
Graphic Library Flaw Exposes Apps Created With Delphi, C++ Builder
21-08-2014
Hackers Exploited Heartbleed Bug to Steal 4.5 Million Patient Records: Report
17-08-2014
Google Bolsters Safe Browsing Service With New Alert for Suspicious Software
17-08-2014
New Bugat Malware Uses HTML Injections Taken From Gameover Zeus
17-08-2014
Bypassing Security Defenses: DEF CON
14-08-2014
BlackBerry Patches Authentication Bypass, Information Disclosure Vulnerabilities
14-08-2014
Kaseya Acquires Scorpion Software to Build Identity Management as a Service Business
14-08-2014
Android Trojan Krysanec Comes Disguised as Legitimate Apps
11-08-2014
Feedback Friday: Russian Hackers Obtained 1.2 Billion Credentials - Industry Reactions
11-08-2014
Podcast: Inside the Epic Turla Cyber-Espionage Campaign
11-08-2014
Hackers Demand Automakers Get Serious About Security
07-08-2014
LogRhythm Launches Honeypot Security Analytics Suite
07-08-2014
NSS Labs Launches Enterprise Cyber Risk Management Solution
07-08-2014
Russian Hackers Obtained 1.2 Billion Passwords: Report
04-08-2014
USB Device Firmware Can Be Reprogrammed to Hide Sophisticated Malware
04-08-2014
Mozilla Accidentally Dumps Info of 76,000 Developers to Public Web Server
04-08-2014
Israel Spied on Kerry During Peace Talks: Report
31-07-2014
Tor Warns of Attack Attempting to Deanonymize Users
31-07-2014
iPhone App "Signal" Enables Free Encrypted Phone Calls
31-07-2014
Cisco Introduces Certification for Industrial Networking Specialists
31-07-2014
Country-Specific Web Domains Can't Be Seized: ICANN
29-07-2014
How hackers ‘steal’ personal data from iPhone’s
29-07-2014
Facebook Security for Parents and Teens
29-07-2014
ISIS-Linked Blog: Bitcoin Can Fund Terrorist Movements Worldwide
29-07-2014
This Handbook Explains How to Hack a Car.
27-07-2014
UK Travel Company Fined After Card Data Hack
27-07-2014
Human Rights Court Approves Extradition of Gozi Malware Suspect to U.S.
27-07-2014
Improved Malware Protection Introduced in Firefox Browser
26-07-2014
CTB-Locker Ransomware Uses Unusual Cryptographic Scheme: Kaspersky
26-07-2014
Seven Arrests Made in $1.6 Million StubHub Cyberfraud Case
26-07-2014
The Flash Upgrade Con that Your Users Fall Victim to and How Invincea Stops It
26-07-2014
Top U.S. Cyber Experts Join Darktrace to Protect Private Sector with Enterprise Immune System Read more: http://www.digitaljournal.com/pr/2069993#ixzz38W6v6ufJ
23-07-2014
Hacking a $100K Tesla Model S For Fun and $10K Profit
23-07-2014
Vice.com hacked, possibly The Wall Street Journal website too
23-07-2014
Op Emmental spoofs bank sites, uses Android malware to maintain account access
21-07-2014
Russian Hackers Put 'Digital Bomb' in Nasdaq Computers
21-07-2014
Calling All Hackers: Help Us Build an Open Wireless Router
20-07-2014
Researchers Analyze Multipurpose Malware Targeting Linux/Unix Web Servers
20-07-2014
Improved Neverquest Trojan Targeting Bank Customers in Japan, US
20-07-2014
Many Security Pros Believe Their Java Applications Are Vulnerable: Survey
18-07-2014
'Government-Grade' Malware in Cybercriminals' Arsenal: Sentinel Labs
18-07-2014
European Authorities Take Down Cybercrime Operation
18-07-2014
Law Enforcement Asks Congress for More Power Against Botnet Operators
15-07-2014
New Trojan Used in Attempt to Resurrect Gameover Zeus Botnet
15-07-2014
Almost 70 Percent of Critical Infrastructure Companies Breached in Last 12 Months: Survey
14-07-2014
Hackers Attack Shipping and Logistics Firms Using Malware-Laden Handheld Scanners
14-07-2014
Kronos: New Financial Malware Sold on Russian Underground Forum
12-07-2014
New Trojan Used in Attempt to Resurrect Gameover Zeus Botnet
12-07-2014
Source Code for Tinba Banking Trojan Surfaces
12-07-2014
Hackers Attack Shipping and Logistics Firms Using Malware-Laden Handheld Scanners
10-07-2014
Boleto Fraud Ring Siphons $3.75 Billion from Brazilian Banks
10-07-2014
Blackshades RAT: A Resurgent and Dangerous Enterprise Threat
10-07-2014
McAfee Plots Security Framework for Internet of Things
09-07-2014
Smart LED Lightbulbs Can be Hacked too; Vulnerability exposes Wi-Fi Passwords
09-07-2014
Chinese Hackers Targeting Middle East Policy Experts: CrowdStrike
09-07-2014
Adware Company Linked to Development and Distribution of Mevade Malware
09-07-2014
DHS Mistakenly Releases 840-pages of Critical Infrastructure Documents Via Mishandled FOIA Request
06-07-2014
Syrian Hacktivists Target Israel Defense Forces
06-07-2014
North Korea Doubles Cyber War Personnel: Report
05-07-2014
Israel Army's Twitter account hacked, posts 'incorrect' tweets
05-07-2014
Goldman Sachs asks judge to force Google to unsend an email
05-07-2014
Android devices leak location data
04-07-2014
Spear phishers abuse Word programming feature to infect targets
04-07-2014
Sneaky Android RAT disables required anti-virus apps to steal banking info
04-07-2014
EFF sues NSA in bid for records related to Heartbleed disclosure
03-07-2014
New Banking Malware Sniffs Traffic via Network APIs
03-07-2014
EFF Flings FOI Lawsuit at NSA Over Heartbleed
03-07-2014
Android Malware Paves Way for Serious Banking Threat
02-07-2014
Barracuda Enhances Mid-Market Firewall Offering
02-07-2014
Serious Vulnerability Patched in Popular Newsletter WordPress Plugin
02-07-2014
Taiwan's Hon Hai Pulls Out of Huawei Deal Over 'Security Threat'
28-06-2014
Podcast: Zach Lanier on PayPal Two-Factor Authentication Bypass
28-06-2014
Human Rights Watch Says Saudi Govt Targeting Dissidents with Malware
28-06-2014
Longstanding Security Vulnerability Found in LZO Compression Algorithm
27-06-2014
Google Nest: Exploiting DFU For Root
26-06-2014
Data Privacy is Top of Mind for the Connected Home
26-06-2014
UK Cops Are Data Protection Flops, Says ICO
26-06-2014
It’s a Trap! Notorious Pony Loader Malware Updated to Steal Bitcoins
24-06-2014
Dataguise Launches Solution for Big Data Governance
24-06-2014
Andreessen Horowitz Places $90 Million Bet on Cybersecurity Firm Tanium
24-06-2014
Consumers Ready for Internet of Things, But Fear Data Privacy and Security Implications: Survey
23-06-2014
No mobile platform is completely secure: Android and iOS both pose risks to the enterprise
23-06-2014
Data Security … Don’t let your data be the next victim to hackers!
20-06-2014
Cybersecurity a key bilateral issue for White House, and not just with China
20-06-2014
AT&T Backs Microsoft's Dispute Over Warrant for Emails Held Abroad
20-06-2014
U.K. Says Laws Permit Mass Spying on Residents Online
19-06-2014
NSW Police Minister considers proposal to license IT security providers
19-06-2014
Tricky new malware strain, Dyre, skirts detection and steals banking credentials
19-06-2014
Analysis Of 3000 Vulnerabilities In SAP
17-06-2014
Domino's Pizza Refuses Extortion Demand After Customer Data Stolen
17-06-2014
Woman to be First Charged Under Philippine Cybercrime Law
17-06-2014
New RAT Bypasses SSL Protection, Targets Bank Credentials: PhishMe
15-06-2014
Malware Targets Retailers Using Cloud-based PoS Services
15-06-2014
Watch Out For Sneaky Cyber Attacks, M&A Firms Warned
15-06-2014
Feds Prepare to Sell Off Silk Road Bitcoin Assets
14-06-2014
Cyber-challenge for Kids Slated for DEF CON
14-06-2014
Former Microsoft Worker Sent to Prison for Theft of Trade Secrets
14-06-2014
Iraq Blocks Social Media Amid Militant Drive: Technicians
13-06-2014
Cybercriminals Ramp Up Activity Ahead of 2014 World Cup
13-06-2014
P.F. Chang's Confirms Payment Card Breach: Reverts to Imprinting Devices
11-06-2014
Second Chinese PLA Hacking Unit Unmasked in ‘Putter Panda’ Report
11-06-2014
Still (Heart)bleeding: New OpenSSL MiTM Vulnerability Surfaces
11-06-2014
New Testing Framework Set to Boost Banks' Cyber Defences
11-06-2014
Still (Heart)bleeding: New OpenSSL MiTM Vulnerability Surfaces
10-06-2014
Podcast: David Ulevitch and the OpenDNS Security Story
10-06-2014
Podcast: David Ulevitch and the OpenDNS Security Story
10-06-2014
Cybercrime Costs Businesses More than $400 Billion Globally: Report
10-06-2014
Cybercrime Cuts Deep in Global Economy: Study
08-06-2014
Some govts maintain 'permanent access' to Vodafone customer data
08-06-2014
Hacker passwords not much stronger than the average user's, researcher finds
08-06-2014
Snowden Damage Apparently Less Than Feared: Report
07-06-2014
RIG Exploit Kit Used to Deliver "Cryptowall" Ransomware
07-06-2014
Internet Giants to Face Tougher EU Data Law
07-06-2014
Infrascale Raises $16.3 Million, Acquires Eversync
06-06-2014
DARPA Announces First Teams and DEF CON Colocation for Cyber Grand Challenge
06-06-2014
DDoS Attacks Growing in Volume and Complexity
05-06-2014
China and UN Hold First Cybersecurity Talks, as State Media Slams US Tech Firms
05-06-2014
Google Plots End-to-End Messaging Encryption
05-06-2014
New Ransomware Encrypts Android Files: ESET
04-06-2014
Exclusive: U.S. companies seek cyber experts for top jobs, board seats
04-06-2014
5 Best Practices for Voice Biometrics Security
04-06-2014
Malware creation breaks all records! 160,000 new samples every day
03-06-2014
Hacktivist Warns World Cup Sponsors Anonymous DDoS Attack is Coming
03-06-2014
Asprox Botnet Targets Snail Mail Users
02-06-2014
Pirate Bay Co-founder Arrested in Sweden
02-06-2014
Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation
02-06-2014
NSA Scoops Up Images for Facial Recognition Programs: Report
31-05-2014
Iranian Cyberspies Pose as Journalists Online To Ensnare Their Targets
31-05-2014
Rapid7 Hires Medical Device Hacker Jay Radcliffe
30-05-2014
Most Mobile Breaches Will be Tied to App Misconfiguration by 2017: Gartner
30-05-2014
Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation
29-05-2014
Kaspersky Lab Advised Maker of Hacker-Themed Video Game 'Watch Dogs'
29-05-2014
Russia, Ukraine Conflict Escalation Mirrored in Malware Activity
29-05-2014
Snowden Should 'Man Up', Face Justice in US: Kerry
27-05-2014
Pre-Play Vulnerability Allows Chip-and-PIN Payment Card Cloning
27-05-2014
Report Finds 97 Percent of Networks Have Been Breached
26-05-2014
Scam Of The Week: eBay Password Reset Phishing Emails
26-05-2014
How to safely and securely recycles Devices
26-05-2014
New Security Fears Over Keyboard and Trackpad Data Retention
25-05-2014
China Promises Strict Security Checks on Government IT Suppliers
25-05-2014
Outlook for Android Leaves Private Messages Wide Open for Stealing
25-05-2014
Lowe's Warns Of Cloud-related Data Compromise
24-05-2014
Facebook Teams Up With Trend Micro and F-Secure to Offer Free Malware Protection
24-05-2014
F5 Networks Acquires DDoS Protection Provider Defense.Net
24-05-2014
eBay, Security Experts Say Database Dump is Fake
23-05-2014
Hazards of the Cloud: Data-Storage Service’s Crash Sets Back Researchers
23-05-2014
Using Fusion Centers to Improve Situational Awareness
22-05-2014
China excludes Windows 8 from government computers
22-05-2014
Ancient 'STONED' Virus Signatures found in Bitcoin Blockchain
22-05-2014
Good and bad? Report says Internet of Things will thrive by 2025 Read more at http://wraltechwire.com/good-and-bad-report-says-internet-of-things-will-thrive-by-2025/13655206/#5QZviYGdUxHUUIWL.99
21-05-2014
U.S. Charges Five in Chinese Army With Hacking
21-05-2014
Information security incidents by agency
21-05-2014
FBI arrests 100 hackers over Blackshades malware
20-05-2014
FBI and Euro Cops Pounce to Cuff Blackshades Malware Users
20-05-2014
Thousands of Home Modems Vulnerable to Credential-Stealing
20-05-2014
Google served maximum fine by French data protection authority over privacy policy failings
19-05-2014
LifeLock Kills Mobile Wallet App, Deletes User Data from Servers
19-05-2014
Cisco's John Chambers Complains to Obama Over NSA's Spying Practices
18-05-2014
NIST Kicks Off Post-Snowden Crypto Standards Review
18-05-2014
Experts Highlight Potential for Security as a Business Enabler as Infosecurity Europe 2014 Attracts More Than 15,000 Unique Industry Professionals
18-05-2014
NSF Awards $15m to Develop Secure Internet Architecture
17-05-2014
Too Many Threats, Too Few Professionals
17-05-2014
The Internet of Things will thrive by 2025 but raise privacy, complexity concerns, experts say
17-05-2014
Detection Is NOT the New Prevention
15-05-2014
Review of NIST Crypto Standards and Development Process Kicks Off
15-05-2014
European Authorities Arrest 12 In 'Vishing' Operation Crackdown
15-05-2014
SanDisk Introduces New Self-Encrypting Solid State Drive
14-05-2014
Enterprises Faced with Analyzing 10K Security Events Per Day
14-05-2014
Doge Vault Investigates Cyber Attack
14-05-2014
IT Experts Urge Estonia to Drop Internet Voting
13-05-2014
A chat with Brook Zimmatore on Cyber security efforts in the EU
13-05-2014
*Sounds* Suspicious? Glenn Greenwald: Here's What Happened On The Day We Revealed Snowdens identity !
13-05-2014
Data breaches take around 229 days before being discovered
11-05-2014
Coming Soon to London: A New Master’s in Cybersecurity
11-05-2014
A Pod of 'Crypto-clone' Ransomware Spawns in 2014
10-05-2014
Heartbleed Bug Hits Industrial Control Systems
10-05-2014
Chip-and-PIN Cards a Key to Consumer Fraud Fears
10-05-2014
Are your kids outsmarting you?
09-05-2014
SSL-Fuzzing mit "Frankencerts"
09-05-2014
Heartbleed: Are You Affected?
09-05-2014
Shocker Symantec Admits That Antivirus Is Dead
08-05-2014
Spy Targeted Colombia Peace Talks, President: Official
08-05-2014
Windows Authentication Protocol Allows Deactivated User Accounts to Live On: Report
08-05-2014
Most Financial, Energy Firms Expect Sophisticated Attacks in Next 12 Months
07-05-2014
FireEye to Acquire Network Forensics Firm nPulse Technologies in $70 Million Deal
07-05-2014
An Intelligent Approach to Stopping Advanced Threats
07-05-2014
Technology's evolving role in White House intelligence
07-05-2014
Stress Isn’t a Threat, It’s a Signal to Change
06-05-2014
Android Trojans Make Up the Bulk of Mobile Threats
06-05-2014
Covert Redirect Issue in OAuth, OpenID Places Security Responsibility in Wrong Place
06-05-2014
EU, Japan to Start Cybersecurity Dialogue
05-05-2014
Android Worm Dangles Pictures to Lure Users to Click
05-05-2014
Adobe Enhances Security in ColdFusion 11
05-05-2014
Dozens Held in Philippines Over Global 'Sextortion' Ring
04-05-2014
White House Report Embraces 'Big Data,' Privacy Rules
04-05-2014
Warning: Plan Your Validation Carefully
04-05-2014
Phishing Attacks on Telecommunication Customers Resulting in Account Takeovers Continue
03-05-2014
Countering cyber security threats with security compliance framework
03-05-2014
KALI Linux Mailing List Website Hacked Using Heartbleed Vulnerability
03-05-2014
WATCH OUT! Internet Explorer Zero-Day Turns into Permanent Threat for XP Users
02-05-2014
How to Make Impenetrable Passwords You Can Remember.
02-05-2014
Stanford’s password policy shuns one-size-fits-all security
02-05-2014
Wanted: 6,000 cyber-warriors--tattooed need not apply
01-05-2014
Insider Threats Compromise Safety of Nuclear Facilities
01-05-2014
Heartbleed used to uncover data from cyber-criminals
01-05-2014
Whitepaper 2FA: Unlocking Security Potential through your mobile phone
30-04-2014
The true cost of lost data
30-04-2014
Stop using Microsoft's IE browser until bug is fixed, US and UK warn
30-04-2014
Oil and Gas Industry The New Era of Cybercrime
28-04-2014
FBI Issues Warning to Healthcare Industry on Cyber Security: Report
28-04-2014
Internet Co-creator Cerf Debunks 'Myth' That US Runs It
28-04-2014
Nasty IE Zero-Day Used in Attacks Against Defense, Financial Sectors: FireEye
27-04-2014
Physicians Find Security In The Cloud
27-04-2014
FBI informant Sabu directed hacking of foreign govt sites
27-04-2014
Are you booked in a hacker-friendly hotel?
26-04-2014
Mozilla Creates $10K Bug Bounty Program for New Certificate Verification Library
26-04-2014
Tech Companies Fund Cybersecurity Initiative
26-04-2014
The Heartbleed "Virus" & Password Vulnerability: Stop The Bleed
25-04-2014
Protect your Website – Why Content Management Systems (CMS) still a favorite for hackers
25-04-2014
UPDATE 5-U.S. regulators to propose new net neutrality rules in May
25-04-2014
NIST to Drop Crypto Algorithm from Guidance
24-04-2014
Banking Trojans, Bitcoins and Espionage Dominate Recent Cyber-threats
24-04-2014
Apple Fixes Critical Triple-handshake Flaw
24-04-2014
Fake Porn App is First SMS Trojan to Land on US Soil
23-04-2014
2014 SecurityWeek Golf Classic to Take Place May 22 at Half Moon Bay
23-04-2014
Attacks Targeting Cloud Hosting Providers Rise: Alert Logic
23-04-2014
DDoS Attacks Prove Costly, Could Top 800 Gbps in 2015: Research
22-04-2014
Identity Management in the Cloud: Top Tips for Secure Identities
21-04-2014
Heartbleed Blows the Lid Off of Tor's Privacy
21-04-2014
Heartbleed Flaw Used to Bypass Two-factor Authentication, Hijack User Sessions: Mandiant
21-04-2014
China's Shadow to Follow Obama Around Asia - Analysis
20-04-2014
Kaspersky Lab Names New North America Chief, Unveils Enterprise Security Strategy
19-04-2014
China Calls on Russia to Tighten Internet Control to Keep Out 'External Forces'
19-04-2014
Inside the Ring: U.S. power grid defenseless from physical and cyber attacks
19-04-2014
3 Million Customer Credit, Debit Cards Stolen in Michaels, Aaron Brothers Breaches
17-04-2014
Canada Police Nab Young Man in Heartbleed Data Theft
17-04-2014
security problems with find xargs rm
17-04-2014
Fingerprint lock in Samsung Galaxy 5 easily defeated by whitehat hackers
16-04-2014
Mandiant: China-backed Cyber Threats Show No Signs of Abatement
16-04-2014
Heartbleed May Have Led to Compromises at Mumsnet and Canada Revenue Agency
16-04-2014
Industry Job Satisfaction Improves, But Skills Gap Persists
15-04-2014
Confirmed: Heartbleed Exposes Web Server's Private SSL Keys
15-04-2014
Document Digital Rights Management Security – 10 Years On
15-04-2014
Android Flaw Allows Home Screen Icons to be Hijacked
14-04-2014
The Heartbleed Continues: Advice from Information Security Professionals
14-04-2014
US Says Cybersecurity Sharing Not an Antitrust Issue
14-04-2014
German Space Research Center Under Espionage Attack: Report
13-04-2014
Do You Know What Your Data Did Last Night?
13-04-2014
NTOMobile On-Demand Web Application Security Testing Is Now Available
13-04-2014
Cisco, Juniper Issue Heartbleed Alerts
12-04-2014
Google Boosts Android Security Protection
12-04-2014
NSA Denies Exploiting 'Heartbleed' Vulnerability
12-04-2014
Open-source Bug Leaves Millions of Websites Exposed to Data Leaks
12-04-2014
Open-source Bug Leaves Millions of Websites Exposed to Data Leaks
11-04-2014
Orbit Open Ad Server Security Hole Closed
11-04-2014
Secure File Sharing App for iOS and Android Released
11-04-2014
SANS’ Eric Cole Gets Infosecurity Europe Hall of Fame Nod
10-04-2014
'Heartbleed' Vulnerability Plugs Canada Tax Filing Website at Crunch Time
10-04-2014
Zeus Variant Contains Legitimate Certificate
10-04-2014
Masergy Acquires Global DataGuard
09-04-2014
Security experts optimistic amid Windows XP end-of-life date
09-04-2014
OpenSSL 'Heartbleed' Bug Leaks Sensitive Data
09-04-2014
Security and Availability of the Cloud Platform
09-04-2014
What is a Threat Intelligence Platform
08-04-2014
Secure storage of passwords in your application by Jim Manico
07-04-2014
Banking Fraud in Latin America
07-04-2014
Botnets Take to Mobile Dating App Tinder to Flirt and Hurt
07-04-2014
Exploit Kits and Redirection Anchor the Data Theft 'Kill Chain'
06-04-2014
McAfee Says CIOs in The Dark on Advanced Evasion Techniques
06-04-2014
DDoS Attackers Increasingly Use Multiple Attack Vectors
05-04-2014
Insider Leaks 1,000-page Dossier on BBC Confidential Sources
05-04-2014
McAfee Says CIOs in The Dark on Advanced Evasion Techniques
05-04-2014
Turkey Lifts Controversial Twitter Ban
03-04-2014
Nearly a Third of PCs Poised to Become Cybercrime Targets
03-04-2014
Insider Leaks 1,000-page Dossier on BBC Confidential Sources
03-04-2014
Kaspersky Unveils Interactive Cyberthreat Map
03-04-2014
Cloud attacks sneak past gap between enterprises and providers
03-04-2014
CryptoDefense Ransomware Rakes in $34K in a Month: Symantec
03-04-2014
NSA-Linked 'Extended Random' Extension Discovered Inside RSA BSAFE: Researchers
02-04-2014
Facebook Builds its Own Threat Information Framework
02-04-2014
Critical Vulnerability Discovered in Waste Automation, Results in Global Ecological Disaster
02-04-2014
Banks Drop Suit Against Target, Trustwave
01-04-2014
'njRAT' Malware Gains Popularity Among Middle East Attack Groups
01-04-2014
Encryption Companies Rise as Anxiety Over Data Mounts
01-04-2014
Uzbekistan Tightens Internet Cafe Scrutiny: Reports
01-04-2014
Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors
31-03-2014
KageCoin Malware Shows Up in Google Play, Ready to Hijack Phones for Mining
31-03-2014
Google Says Public DNS Intercepted by ISPs in Turkey
31-03-2014
Why Congress Can't Pass Cyber Law
31-03-2014
Partial Disclosure Proposal To Replace Proper Disclosure In Infosec
30-03-2014
CenturyLink wins $1.7 million US Defense Information Systems Agency contract
30-03-2014
WSJ Breaking News: Information on the internet is not private
30-03-2014
This One Weird Security Fix Makes the World Safer
28-03-2014
Target's Weak Points, Examined
28-03-2014
South Korea Detects Suspected North Korea Hacking Attempt
28-03-2014
Russian Officials Dump iPads for Samsung Tablets Over Spy Fears
27-03-2014
Apple Mac Ebay Scam Gang Busted
27-03-2014
Microsoft Puts Big Bet on Hardware Security with Windows 8.1
27-03-2014
Snoopy: A Non-NSA Flying Stingray
26-03-2014
Despite Pwn2Own 2014 hacks, application sandboxing still critical
26-03-2014
Advanced threat detection products yet to earn trust of enterprises
26-03-2014
Advanced threat detection products yet to earn trust of enterprises
25-03-2014
Basecamp Briefly Knocked Offline in DDoS Extortion Scheme
25-03-2014
China's Xi Challenges Obama on Telecoms Spying Report
25-03-2014
Researchers Outline How to Crack WPA2 Security
24-03-2014
Syrian Electronic Army Hacks Microsoft, and the Country Disappears from the Web
24-03-2014
Exclusive: ‘Britain’s FBI’ in crisis as officers face data charges
24-03-2014
This drone can steal what's on your phone
23-03-2014
Mass Compromise Attack Hits Web Sites Running on Old Linux Kernel
23-03-2014
Obama Meets Internet Bosses on Surveillance
23-03-2014
European Hackers Test Their Skills in Geneva
22-03-2014
Retail Tracking and Privacy Crypto Cracked in Minutes, for Less than a Dollar
22-03-2014
One of the Web's Top Porn Outlets Serves Up Malware
22-03-2014
Syrian Electronic Army Hacks Microsoft, and the Country Disappears from the Web
21-03-2014
Retail Tracking and Privacy Crypto Cracked in Minutes, for Less than a Dollar
21-03-2014
Linux Worm Turns Focus to Digital Dollars
21-03-2014
DDoS for Hire
20-03-2014
Imperva finds old PHP vulnerability still being exploited by attackers
20-03-2014
Why we need to rethink how we view security
20-03-2014
US charges three in multi-million dollar cybercrime case
19-03-2014
Commercial RAT Used by Malicious Hackers
19-03-2014
Google DNS servers suffer brief traffic hijack
19-03-2014
A DFIR ANALYSIS OF A WORD DOCUMENT SPEAR-PHISH ATTACK
18-03-2014
IBM: No Backdoors, No Source Code, No Client Data Provided to NSA
18-03-2014
Don't Forget DNS Server Security
17-03-2014
US to Relinquish Key Oversight Role for Internet
17-03-2014
NATO Websites Targeted in Attack Claimed by Ukrainian Hackers
17-03-2014
Ukraine War Already in Full Swing in Cyberspace
16-03-2014
Google Encrypts Search, Aims To Foil China, NSA
16-03-2014
LightOut is Latest Cyber Threat to Target Energy Sector
15-03-2014
Researcher finds easier way to exploit iOS 7 kernel vulnerabilities
15-03-2014
Backdoor Found in Samsung Galaxy
15-03-2014
British Government Plans to Take Cybersecurity Into Schools
14-03-2014
How Turla And “Worst Breach Of U.S. Military Computers In History” Are Connected
14-03-2014
ICS Flaws Discovered that Could Affect Thousands of Plant-monitoring Systems
14-03-2014
Nokia Tackles Carrier Roles in Mobile Security with Berlin-based Cybersecurity Center
13-03-2014
More Than 162,000 WordPress Websites Leveraged to Launch DDoS
13-03-2014
Inside China's Market for Mobile Cybercrime
13-03-2014
High Demand Pushes Average Cyber Security Salary Over $93,000
12-03-2014
Experian ID Theft Exposed 200M Consumer Records
12-03-2014
Feinstein excoriates CIA for spying on Senate committee
12-03-2014
More than 162,000 WordPress sites used in DDoS attack
11-03-2014
Cyber Experts: Israel Under Attack
11-03-2014
How this one innocuous tweet could hack a bank account
11-03-2014
Caller ID shows your bank's number – but it's actually a fraudster
10-03-2014
Obama Cyber Coordinator on Global InfoSec
10-03-2014
A risk equation unravels the cloud security paradox
10-03-2014
Invisible Russian cyberweapon stalked US and Ukraine since 2005, new research reveals
09-03-2014
Dendroid RAT: the Next Stage of Android Malware Evolution
09-03-2014
Judge Declares Mistrial in Juniper's Suit Against Palo Alto Networks
08-03-2014
NIST Guide Aims to Ease Access Control
08-03-2014
Ukraine hit by cyberattacks: head of Ukraine security service
08-03-2014
CloudLock Launches Compliance Solution for Google+
06-03-2014
TOR Network Increasingly Being Abused by Cybercriminals: Kaspersky Lab
06-03-2014
Sold-out Tickets to the World Cup, Beyoncé and More! For a Malware Price
06-03-2014
Crypto Error Leaves Hundreds of Applications Open to Fake Certificates
05-03-2014
Attackers alter DNS configurations remotely, compromise 300K routers
05-03-2014
Widespread Attack Campaign Highlights Router Security Woes
04-03-2014
Mt Gox Files for Bankruptcy Protection in Japan
04-03-2014
Encryption's Not Enough to Thwart Hackers
04-03-2014
Russia Today’s website defaced in ‘Nazi’ hack attack
03-03-2014
Blackphone: Privacy for Lazy People
03-03-2014
2014 US Cyber Challenge Kicks Off in April
03-03-2014
Revenge Porn: One Win (Texas), One Fail (New York)
03-03-2014
The Cyber Security Gap in Education
01-03-2014
Boeing Self-Destructing Smartphone: Do Not Try to Open
01-03-2014
Data Center Security Challenged by Configuration Issues
01-03-2014
US Slaps Briton With Fresh Hacking Charges
28-02-2014
IARPA seeks algorithm to measure trustworthiness
28-02-2014
New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry
28-02-2014
Scientists demonstrate first contagious airborne WiFi virus
27-02-2014
White House faces options for regulating NSA data snooping -- report
27-02-2014
Target: Breach Hurt Profits
27-02-2014
RSA 2014: Bruce Schneier champions encryption in 'golden age' of government surveillance
26-02-2014
RSA 2014: Art Coviello Addresses RSA/NSA Controversy in Keynote
26-02-2014
Cisco Integrates Sourcefire's Malware Protection Technologies
26-02-2014
Check Point Unveils 'Software-Defined Protection' Security Architecture
25-02-2014
Source code for Android iBanking bot surfaces on underground forum
25-02-2014
STORES CAN SEE WHERE YOU GO BY TRACKING YOUR PHONE
25-02-2014
Confirmed: EC-Council has been hacked 2014
24-02-2014
BYOD and Cloud Threats Loom, But IT is Woefully Unprepared
24-02-2014
80% of SOHO Routers Contain Vulnerabilities
24-02-2014
Turkey Reveals Scale of Eavesdropping by Spy Agency
23-02-2014
First NSA-proof phone already on the market
23-02-2014
Researchers Find SSL Problems in WhatsApp
23-02-2014
NIST Official: B2B Use of Cybersecurity Framework is the ‘Moonshot’
22-02-2014
Source code for data-stealing Android app leaks
22-02-2014
Report: Malicious apps in Google Play store grow 388 percent
22-02-2014
Google Acquires Spider.io to Help Combat Online Ad Fraud
22-02-2014
Apple Fixes SSL Authentication Flaw in iOS
21-02-2014
UMD Data Breach
21-02-2014
NIST's Gallagher: Framework Implementation Falls to Companies, Not DHS
21-02-2014
Last Year’s Power Grid Attack: The Biggest Business Continuity Story That No One Heard About
20-02-2014
EMPOWERING MORE WOMEN TO EMBRACE INFORMATION SECURITY
20-02-2014
Hackers targeting Canadian debit machines: Cyber security firm
20-02-2014
Manipulating Quantum Bits for Cybersecurity
19-02-2014
Skillful Hackers Drained ATMs Using Malware-laden USB Drives
19-02-2014
Cylance Takes a Mathematical Approach to Solving Malware Problems
19-02-2014
Data From 35,000 AT&T Customers Sought by Secret Court
18-02-2014
Google Acquires Authentication-by-Sound Startup SlickLogin
18-02-2014
Moon Landing: New Worm Spreads Itself via Linksys Routers
18-02-2014
Merkel and Hollande Propose a European Internet
17-02-2014
The Myth of the Bell Curve
17-02-2014
Ζητούνται έμπειροι χάκερ για άμεση πρόσληψη...
17-02-2014
Introducing Strict SSL: Protecting Against a Man-in-the-Middle Attack on Origin Traffic
17-02-2014
300000 Android Devices infected by Premium SMS-Sending Malware
16-02-2014
Snowden Used Password From NSA Co-worker: Report
16-02-2014
New IE 10 Zero-Day Used in Watering Hole Attack Targeting U.S. Military
16-02-2014
Apple Publishes Secure Coding Guide for Developers
15-02-2014
IBM researcher: Companies won't invest in data privacy until society demands it
15-02-2014
White House unveils cybersecurity framework
15-02-2014
UPDATE 1-Researchers uncover cyber spying campaign dubbed "The Mask"
15-02-2014
NSA Memo Says Snowden Tricked Colleague to Get Password
15-02-2014
The NIST Framework is Out the Door. So What's Next?
15-02-2014
NSA Memo Says Snowden Tricked Colleague to Get Password Read more: NSA Leaks: Edward Snowden Stole Password, Memo Says | TIME.com http://swampland.time.com/2014/02/13/nsa-leaks-edward-snowden-passwor
14-02-2014
Behavior Analysis: New Weapon To Fight Hackers
14-02-2014
UK lags behind US in Security Preparedness and Attitudes
14-02-2014
NIST Issues Completed Cybersecurity Framework
13-02-2014
Vendor reports largest-ever NTP reflection-driven DDoS attack
13-02-2014
Design Risk Management Plans to Fail: Bank Security Expert
13-02-2014
Not So Good News: Smart Building Industry Experiences Major Technology Challenge!
12-02-2014
Free, public Wi-Fi can be dangerous to your credit card
12-02-2014
Hundreds of Canadian credit cards hacked by infected terminals, firm warns
12-02-2014
Hackers exploiting Router vulnerabilities to hack Bank accounts through DNS Hijacking
11-02-2014
Whistleblower Blows Whistle on Barclays Bank
11-02-2014
Palo Alto Networks Launches Its Fastest Next-Generation Firewall
11-02-2014
Snapchat iPhone App Security Hole Creates DoS Opportunity
10-02-2014
Target now says up to 110 million customers victimized in breach
10-02-2014
Target Hackers Broke in Via HVAC Company
09-02-2014
The Life of a Security Researcher
09-02-2014
Creating resilience with public/private partnerships—and planning
09-02-2014
On Deck: The Cybersecurity Framework
09-02-2014
Washington Responds to Cybersecurity Threats with Recommendations and Legislation
07-02-2014
Sexting a Rising Trend Among U.S. Adults
07-02-2014
Healthcare Data Breaches Become Epidemic
07-02-2014
If You Used This Secure Webmail Site, the FBI Has Your Inbox
06-02-2014
Smart Chip Credit Cards Wouldn't Have Saved Target
06-02-2014
Do ATMs running Windows XP pose a security risk? You can bank on it
06-02-2014
Hacked Within Minutes: Sochi Visitors Face Internet Minefield - Watch Video
05-02-2014
Wired – Big Data Brings Big Changes to Recruiting
05-02-2014
Engineering & computer science majors earned the highest starting salaries in 2013 (report)
05-02-2014
Hot IT job skills in 2014: Mobile, web development and big data
04-02-2014
NIST to Update Education Guidance
04-02-2014
Corero Launches New DDoS Protection Appliances for Service Providers
04-02-2014
Internet Titans Shine Light on Secret US Requests
03-02-2014
New Malware Records Everything You Do on Your iPhone
03-02-2014
Oldboot for Android: 350K+ Devices Infected, and It's Sticking Around
02-02-2014
Chrome fights back against settings hijackers
02-02-2014
New Malware Records Everything You Do on Your iPhone
01-02-2014
Defense.Net Launches New Service to Combat DDoS Attacks
01-02-2014
Hackers Hit Yahoo Mail With Mass Account Checker Attack
01-02-2014
Canada Captured Data From Airport Travelers via WiFi: Report
31-01-2014
Angry Birds site hacked after surveillance claims
31-01-2014
Angry Birds maker Rovio: We don't share data with NSA
31-01-2014
Has a jealous lover hired hackers to get into your e-mail?
31-01-2014
NSA's warrantless surveillance gets a constitutional challenge
30-01-2014
US 'Committed' to Hunting Down Target Hackers
30-01-2014
DDoS Attacks in Europe Spike 22%
29-01-2014
SpyEye Developer Pleads Guilty
29-01-2014
Fully Functional FileZilla Client Capturing FTP Login Details
29-01-2014
US, British Spies Tap Mobile Apps: Report
28-01-2014
VMware Looks to Improve Its Cloud With AirWatch
28-01-2014
Bitcoin could be crime-fighter against credit hacks
28-01-2014
Converged Analysis of Smartphone Devices
27-01-2014
Websites of the US Federal Court System Disrupted by Cyberattacks
27-01-2014
Coca-Cola: Stolen Laptops Had Personal Information of 74,000
27-01-2014
Spear-phishing, Watering Holes, Drive-bys…The Case for Invincea
26-01-2014
Shape Security Emerges From Stealth Mode Swinging at Malware and Bots
26-01-2014
Hackers Steal Law Enforcement Inquiry Documents from Microsoft
25-01-2014
France Military to up Defenses Against 'Cyber War'
25-01-2014
Improved Cyber Security Could Save Global Economy Trillions: World Economic Forum
25-01-2014
FBI Busts the Most Hated Man on the Internet
25-01-2014
Microsoft Will Allow European Data to be Kept in Europe
25-01-2014
123456:' Worst. Password. Ever.'
24-01-2014
Unsafe and sound
24-01-2014
Tor exit nodes attempt to spy on encrypted traffic, researchers find
22-01-2014
Banks need to know more about customers to fight cross-channel fraud - ThreatMetrix
22-01-2014
Target Tried Antitheft Cards
22-01-2014
Phishing Like A Monarch With King Phisher
22-01-2014
Phishing Like A Monarch With King Phisher
22-01-2014
Target Tried Antitheft Cards
21-01-2014
Starbucks, strong coffee, clear passwords?
21-01-2014
NSA will collect bulk data for at least another 18 months
21-01-2014
Malware infects users through trusted Chrome extensions
20-01-2014
Fujitsu Looks to Protect Privacy While Searching Encrypted Data
20-01-2014
Security Risks of Embedded Systems
20-01-2014
Tech firms vie to secure energy sector against cyberattacks
19-01-2014
The Attack on Retailers’ Memory, and How to Prevent It
19-01-2014
ENISA Seeks Better Incident Reporting From Cloud Providers
19-01-2014
Connected Cars Roll Into Privacy Concerns
18-01-2014
NSA Scoops Up Millions of Text Messages a Day: Report
18-01-2014
Cyber Attack Leverages Internet of Things
17-01-2014
CipherCloud Acquires CloudUp Networks
17-01-2014
New Blackphone aims to quash surveillance threat
17-01-2014
Apple to refund $32.5 million after kids rack up app charges without adult consent
16-01-2014
Strikes, fouls aplenty in 2014 RSA Conference boycott, MLB HoF vote
16-01-2014
Critical patch fixes nearly 150 flaws in hundreds of Oracle products
16-01-2014
Health care industry to ready itself for simulated attack exercise "CyberRX"
15-01-2014
Why the Belgian Cyber Security Guide Must Be Extended? Example with MySQL!
15-01-2014
Google Glass and National Security Missions
15-01-2014
Cisco confirmed that a Backdoor affects small business devices
14-01-2014
Obama to Unveil Spying Reforms on January 17
14-01-2014
Energy Sector Faces Rocky Cyber-Threat Landscape: Report
14-01-2014
Hacked Cybercrime Forum Exposes Nearly 20,000 "Bad Actors"
13-01-2014
Obama to explain changes to NSA surveillance programs next week
13-01-2014
Personal banking apps leak info through phone
13-01-2014
Neverquest banking malware more dangerous than Zeus trojan
12-01-2014
Target breach update: Information on up to 70 million customers stolen
12-01-2014
Two Thirds of Personal Banking Apps Found Full of Vulnerabilities
12-01-2014
Google Integrates Gmail and Google+, Raising Privacy Concerns
10-01-2014
CSA top 10 big data security, privacy challenges and how to solve them
10-01-2014
8 Reasons to Fear Cloud Computing
10-01-2014
French researcher finds gaping holes in security of DSL modems
09-01-2014
The Edward Snowden effect: CSA CEO on U.S. cloud provider security
09-01-2014
Palo Alto-Morta Security deal is latest 2014 information security acquisition
09-01-2014
next-generation firewall (NGFW)
08-01-2014
Reverse Engineering a Bank's Security Token
08-01-2014
How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer
07-01-2014
Malware Attacks Deployed by “Advanced Power” Botnet
07-01-2014
Malware Attacks Deployed by “Advanced Power” Botnet
07-01-2014
Surface, BitLocker, and the future of encryption
06-01-2014
The Ubiquitous SD Cards can be Hacked to Deliver a MITM Attack
06-01-2014
Global Academics Unite Behind Anti-surveillance Declaration
06-01-2014
Cybersecurity Simplified: A Reality Check for the Digital Age
04-01-2014
Marine Cybersecurity: Is Your Ship Safe? Are You Sure?
04-01-2014
Report: NSA Trying To Build A Quantum Computer To Crack Encryption
04-01-2014
Cloud computing 2014: Moving to a zero-trust security model
03-01-2014
NSA Collection of Metadata is Lawful says Federal Judge
03-01-2014
Snapchat Attack May Have Exposed Data of Millions of Users
02-01-2014
Be A Little More Secure This New Year
02-01-2014
11 Million Attacks on Gamers in 2013
02-01-2014
4 Trends In Vulnerabilities That Will Continue In 2014
01-01-2014
14 IT security predictions for 2014
01-01-2014
Researchers Demonstrate MicroSD Card Hack
01-01-2014
Apple Denies Cooperating With NSA to Develop iPhone Backdoor
01-01-2014
Don't Focus on Predictions: What are Your 2014 IT Security Resolutions?
31-12-2013
9 Notorious Hackers Of 2013
31-12-2013
Federal Agencies Lack E-Discovery Savvy
31-12-2013
Security, Privacy & The Democratization Of Data
31-12-2013
Exploit of eBay site flaw could allow account takeover
30-12-2013
IBM’s predictions for next five years: everything will learn
30-12-2013
Target Says Encrypted PIN Data Taken in Breach
30-12-2013
Your LinkedIn Password Is On Display in a Museum in Germany
29-12-2013
Surface, BitLocker, and the future of encryption
29-12-2013
Will Employers React to Target's Data Breach by Hiring More Cyber Talent?
29-12-2013
U.S., Russia Hold Cybersecurity Talks
28-12-2013
Royal pardon for codebreaker Alan Turing
28-12-2013
Royal pardon for codebreaker Alan Turing
28-12-2013
Cybersecurity Will Get More Complex in 2014
28-12-2013
Cybersecurity Will Get More Complex in 2014
27-12-2013
Don't Focus on Predictions: What are Your 2014 IT Security Resolutions?
27-12-2013
Security Researcher Backs Out of RSA Conference Talk After NSA Controversy
26-12-2013
Smartphones At Threat This Christmas Warns Kaspersky Lab
26-12-2013
Smartphones At Threat This Christmas Warns Kaspersky Lab
26-12-2013
Smartphones At Threat This Christmas Warns Kaspersky Lab
26-12-2013
Smartphones At Threat This Christmas Warns Kaspersky Lab
26-12-2013
Malware Analysis and Incident Response for the Lazy
25-12-2013
Information Security’s Christmas Vacation
25-12-2013
The 12 cyber-scams of Christmas
25-12-2013
Detected 64-bit ZeuS banking trojan using Tor network
24-12-2013
BitTorrent introduces secure, serverless messaging system
24-12-2013
Israel and Saudi Arabia are plotting a cyber weapon worse than Stuxnet
24-12-2013
The night before Christmas and all through the cloud, not a CISO was stirring, none clicking a mouse.
23-12-2013
Improving SCADA System Security
23-12-2013
Hotel Reservation Service Hacked
22-12-2013
Hackers hit Washington Post for second time in three years
22-12-2013
Beware: MacBook Webcams can be used to covertly spy on people
22-12-2013
Washington Post servers attacked, paper suspects Chinese hackers
22-12-2013
NSA contracted RSA to use flawed algorithm, leaks reveal
21-12-2013
Mobile Devices Will Pose The Biggest Risk In 2014, Survey Says
21-12-2013
Google Glass Gets even Creepier .. Bad news or good ?
21-12-2013
Bluetooth LE is poised to revolutionize mobile security
20-12-2013
Target: 40 Million Cards at Risk
20-12-2013
Researchers Make Webcam Spying More Sneaky
20-12-2013
Researchers Reveal How to Extract Decryption Keys With Sound
19-12-2013
The Worst Security SNAFUs of 2013
19-12-2013
Chewbacca Malware Smuggles Keylogging with Tor
19-12-2013
Industry Predictions for 2014; Part 1: Cloud
18-12-2013
Air Force looking to hire 1,000 cyber-security professionals
18-12-2013
Preventing spam over IP telephony
18-12-2013
Privacy and Cloud Computing in Public Schools
17-12-2013
Privacy in the NIST Cybersecurity Framework
17-12-2013
Top Brands Imitated by Malicious Spam
17-12-2013
APT Detection Framework
16-12-2013
Chinese Cyberspies Are Hacking Into America's Small Businesses, But Not For The Reason You'd Think
16-12-2013
Identity Management’s Future may be a Little Blurred!
16-12-2013
A Cyber Security New Year's Resolution: Simplify Security
16-12-2013
2014 Security Predictions
15-12-2013
The NSA Used Sleeper Malware to Infect Computer Networks
15-12-2013
EU legal eagle Legal: Data protection reforms 'very bad outcome' for citizens
15-12-2013
How Will NIST Framework Affect Banks?
15-12-2013
New Gmail image server proxies raise security risks
14-12-2013
How Internet-Style Routing For Gas Could Dramatically Improve Europe's Energy Security
14-12-2013
Privacy and Integrity on the Internet of Things. If all you have is a PKI hammer…
14-12-2013
Check if you have an account that has been compromised in a data breach
12-12-2013
IS ELASTIC SECURITY POSSIBLE FOR YOUR PRIVATE CLOUD?
12-12-2013
Microsoft's anti-NSA encryption pledge raises questions
12-12-2013
Xbox Live among game services targeted by US and UK spy agencies
11-12-2013
Mobile apps security study conducted by HP Fortify
11-12-2013
"Research Shows Air-Gap Hopping Super Trojan BadBIOS Is Possible"
11-12-2013
Infographic: Is Your Data Running Wild?
10-12-2013
Cold War to cyber war, here’s how weapon exports are controlled
10-12-2013
Privacy and Integrity on the Internet of Things.
10-12-2013
How to find out if your password has been stolen
09-12-2013
Pentagon exploring methods to mitigate insider threats
09-12-2013
Use Unique Passwords & Safe Password Hints!
09-12-2013
Microsoft Looks to Encryption for Cloud Data Protection
08-12-2013
Carberp-based trojan attacking SAP
08-12-2013
TIME magazine TWITTER account hacked by Syrian electronic army
08-12-2013
German police arrest Bitcoin hackers
08-12-2013
JP Morgan warns customers of possible data theft after cyber hack
07-12-2013
Scientist-developed malware covertly jumps air gaps using inaudible sound
07-12-2013
Singapore Banks Told to Boost Security After StanChart Data Theft
07-12-2013
Unapproved SaaS Applications Widely Used Under IT's Radar
06-12-2013
FTSE 350 companies 'not taking cyber security seriously'
06-12-2013
Pony Botnet Lifts Two Million (Mostly Weak) Passwords
06-12-2013
Guidance for cloud
06-12-2013
Malware Domain List
05-12-2013
NSA 'tracking' hundreds of millions of mobile phones
05-12-2013
Obama Not Allowed an iPhone for Security Reasons
05-12-2013
ENISA Releases Guide for Defending Against Attacks on Industrial Control Systems
05-12-2013
Quarri Technologies Launches New 'Armored Browser'
04-12-2013
Popular Bitcoin forum targeted in DNS and DDoS attack
04-12-2013
Firm examines critical flaws afflicting top browsers
03-12-2013
Most U.S. travelers Are Careless While Using Public Wi-Fi
03-12-2013
How Much Does Cybercrime Cost? $113 Billion
03-12-2013
Why Leaders Should Still Pay Attention To Charles Handy's Quiet Wisdom
02-12-2013
One in Four Users Don’t Take Precautions Against Phishing Scams
02-12-2013
Warning: "A new message from Skype Voicemail Service" spam leads to Zeus Malware
02-12-2013
US NAVY: Hackers 'Jumping The Air Gap' Would 'Disrupt The World Balance Of Power'
01-12-2013
Preparing for war: how far are we from a mass mobile cyber battle?
01-12-2013
Estonia Hosts European Cyber-Defense Excercise
01-12-2013
Is Your WLAN Blind To Unlicenced Transmissions?
30-11-2013
Learn about the risks of unnecessary privileges
30-11-2013
Linux Worm Targets "Internet of things"
30-11-2013
Bitcoin community offers up $10K bug bounty
30-11-2013
'Neverquest' trojan threatens online banking users
29-11-2013
Giving Thanks for Decryption
29-11-2013
Threat intelligence starts with the human element
28-11-2013
Live and upcoming webcasts
28-11-2013
Sophisticated Banking Trojan Gaining Steam as Holidays Approach
28-11-2013
EU Lays Down Data Protection Steps for US
28-11-2013
Security experts welcome UK banking cyber attack test
27-11-2013
Beautiful Women Make for Excellent Hackers
27-11-2013
News Survey: Most Europeans fear cybercrime but fewer take security measures
27-11-2013
NSA Has Hacked 50,000 Computers Globally
26-11-2013
Fake Donation Requests for Victims of the Typhoon in Philippines
26-11-2013
Your AntiVirus Does Not See NSA's Botnet
26-11-2013
Hackers reportedly stole 42 million customer records from online dating network Cupid Media
24-11-2013
The more you know, the less likely you are to be a victim of cybercrime
24-11-2013
'Team Moscow' wins $100K in PayPal's Battle Hack 2013
24-11-2013
Zettaset Enables Encryption of Data-at-rest in Hadoop
24-11-2013
Lenovo Network Storage Device Vulnerability Patched
23-11-2013
Scan Network Traffic Using a Proxy Server with Metascan ICAP
23-11-2013
U.S. financial industry pushes Congress to pass cybersecurity bill
23-11-2013
Is Google breaking wiretap laws when they read your Gmail?
23-11-2013
GitHub users with weak passwords - you have been warned!
22-11-2013
How Voice Biometrics Authentication Works
22-11-2013
A NICE MAN WANTS TO GIVE ME SOME MONEY…
21-11-2013
NSA has asked Linus Torvalds to inject covert backdoors into the free and open operating system GNU/Linux
21-11-2013
Governments Move to the Cloud for Mobile Security
21-11-2013
Cryptolocker Ransomware – 10M UK Users targeted.Basic countermeasures
20-11-2013
Zero-day in vBulletin affects members, and MacRumors Forums
20-11-2013
Nordstrom card-skimming scheme lasted nearly two months
20-11-2013
Germany Jails NATO IT Expert Who Stole Secret Data
19-11-2013
ALERT - Mass ransomware spamming event targeting UK computer users
19-11-2013
Why Firewalls and IPS Cannot Stop DDoS Attacks - Radware
19-11-2013
Update of Android malware uses exploit to take over
18-11-2013
Cyber attacks on healthcare.gov reported to DHS
18-11-2013
North Korea Gets Its Hands on Electromagnetic Pulse Weaponry
18-11-2013
Securing the Internet of Things: 5 Easy Pieces
18-11-2013
Creating Valuable Cybersecurity Metrics
17-11-2013
Attackers Hide Communication With Linux Backdoor
17-11-2013
Hacker Jeremy Hammond Gets 10-year Sentence
16-11-2013
5-year-old leukemia patient gets to be Batman for a day
16-11-2013
Hi-Tech Tattoos Could Replace Personal Passwords
16-11-2013
5 Lessons We Can Learn From The Adobe Hacking Incident
16-11-2013
International Space Station Computers Infected with Gaming Trojan in 2008
16-11-2013
Cloud-Based Sandboxing is the Future of Network Security
14-11-2013
Google wants tattoos to act as smartphone microphones
14-11-2013
Malware and Antivirus Systems for Linux
14-11-2013
Stores Sniff Out Smartphones to Follow Shoppers
13-11-2013
Cyber attack ‘war game’ to test London banks
13-11-2013
Big Data Success Hinges on Consumer Trust
13-11-2013
Public Cloud: Risky Business? Or Pragmatic Approach?
12-11-2013
PCI Update: Focus on Third-Party Risks
12-11-2013
Governing the 'Internet of Things'
12-11-2013
CipherCloud Offers Data Encryption for Amazon Web Services
11-11-2013
Hackers Expose Asia's Weak Cyber Defenses
11-11-2013
Malware Analysts Say Breaches Are Not Being Disclosed by Their Employers
11-11-2013
$1.3 Million in Bitcoin Stolen in Major Online Robbery
11-11-2013
Facebook mulls silently tracking users' cursor movements to see which ads we like best
10-11-2013
NIST to review standards after cryptographers cry foul over NSA meddling
10-11-2013
Is A Tsunami Of SAP Attacks Coming?
10-11-2013
Microsoft Warns of Office Zero-Day, Active Hacker Exploits
10-11-2013
Security Tradeoffs - a Culture of Convenience
09-11-2013
Schneier: Make Wide-Scale Surveillance Too Expensive
09-11-2013
Know Your International Data Privacy Landscape
09-11-2013
SC Congress Chicago, Nov. 20 - Five free VIP passes for info security community members
09-11-2013
Dark Web Bazaar Silk Road Touts Reopening
09-11-2013
Australian Claims Huge Bitcoin Robbery
08-11-2013
Fraudsters: From Counterfeit Wine to Cybersecurity
08-11-2013
Average cost of cybercrime grows again due to sophisticated attacks
07-11-2013
Hidden chips inside irons for cyber espionage
07-11-2013
IID Raises $8 Million to Expand Shared Threat Intelligence Platform
07-11-2013
Survey: Vast Majority of Employees Use Unauthorized File Sharing Services
06-11-2013
Today's Greatest Online Payment Risk Insights on Fixing Inadequate Authentication
06-11-2013
CryptoLocker Most Current Prolific Malware
06-11-2013
Cloud Security Market Set to Hit $3.2 billion in 2015
05-11-2013
Inside the Samsung Galaxy Note 2 lock screen bypass vulnerability
05-11-2013
New data on enterprise mobile security
05-11-2013
Deploying network security devices: Tips to avoid failed deployments
04-11-2013
Enterprise app store encryption: Lessons to learn from Apple
04-11-2013
The Most Dangerous Websites On The Internet & How To Effectively Protect Your Enterprise From Them
04-11-2013
4 Steps To Combat Malware Enterprise-Wide
03-11-2013
Finnish Government Network Hacked
03-11-2013
Infosecurity - Thanks to a False Sense of Security, Small Businesses Are Skipping Cyber-Protection
03-11-2013
(ISC)² Recognizes Excellence in Government Cybersecurity
03-11-2013
Amount of Mobile 'Madware' Spikes in Google Play
02-11-2013
China Passes Tighter Information Law
02-11-2013
Once-A-Year Risk Assessments Aren't Enough
02-11-2013
Bitcoin Forensics – A Journey into the Dark Web
02-11-2013
ITIL 2011 and ISO/IEC 27001 2013: can you employ them together?
02-11-2013
Data Security Added to Worries About Website
02-11-2013
NSA’s MUSCULAR Project and the Importance of Encryption Key Management
02-11-2013
Privacy in the Age of Big Data
02-11-2013
Google Reprimanded for “The Single Greatest Breach in the History of Privacy”
01-11-2013
Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks
01-11-2013
Mobile Biometric Security Products And Services To Generate Over $8.3 Billion Revenue By 2018
01-11-2013
Attackers Ramp Up Threats to the Energy Sector
01-11-2013
10 IT risk management issues that are often overlooked
31-10-2013
1024-bit Certificate Deadline Are you ready?
31-10-2013
UKs top 10 threats today from Eset's Virus Radar
31-10-2013
User-Selected Passwords Still Getting Cracked
31-10-2013
New Snowden Leak Reports ‘Groundbreaking’ NSA Crypto-Cracking
29-10-2013
Mega CEO: Forget anonymous e-mail. Think privacy (Q&A)
29-10-2013
Collaboration is key in enterprise security puzzle
29-10-2013
Killer Apps that Could Keep You Healthy
29-10-2013
Sharing the Power of the Crowd
28-10-2013
Why Google’s rapid growth means faster search
28-10-2013
Angry Birds - The Rise of the Machines
28-10-2013
New technique can find machinery gremlins 100 times faster
28-10-2013
Google fights for Internet freedom with new tools
28-10-2013
The Real Privacy Problem
28-10-2013
Your body is the next frontier in cybercrime
26-10-2013
UN Atomic Agency Found Malware on Computers
26-10-2013
NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments
26-10-2013
NIST Releases Preliminary Cybersecurity Framework, Will Seek Comments
25-10-2013
Collaboration Enhances Fraud Detection
25-10-2013
Android security relies on ZOMBIE CRYPTO, argues infosec pundit
25-10-2013
New EU rules to curb transfer of data to US after Edward Snowden revelations
25-10-2013
5 Skills Every Risk and Security Leader and Professional Should Develop to Be More Effective
25-10-2013
Thomas J. Trappler: Why physical security matters, even in the cloud
25-10-2013
Vilnius ICT 2013 Event: "secure and privacy-aware mobile devices" networking session
25-10-2013
How to Select a Strong Password Without Forgetting It
23-10-2013
Skype under investigation over link to NSA
22-10-2013
CryptoLocker attacks that hold your computer to ransom
22-10-2013
Hiring The Hackers: How The UK's New Cyber Force Could Recruit Convicts
22-10-2013
NCA to hire 400 cyber crime fighters by end of 2014
22-10-2013
Apollo Malware Campaign Targets Bankers in Eastern Europe
21-10-2013
How IBM Is Making Computers More Like Your Brain. For Real
20-10-2013
http://www.thewhir.com/web-hosting-news/arbor-networks-reports-alarming-increases-in-ddos-attack-size-in-2013
20-10-2013
What’s in a certificate chain and why?
20-10-2013
Defending Your Company's Reputation in Cyberspace
20-10-2013
Cybersecurity is hot: Here are the biggest backers
20-10-2013
Creating a Science of Security
20-10-2013
Advanced attackers seen moving to sophisticated hacking technique
20-10-2013
Cisco says controversial NIST crypto - potential NSA backdoor -- 'not invoked' in products
20-10-2013
Public Cloud Security is Back to The Future
20-10-2013
Skycure Monitors Network Activity of iOS Devices for Security
14-10-2013
Greek Foreign Ministry Says Emails Hacked
14-10-2013
jOELS Backdoor found in D-Link router firmware code
14-10-2013
ATM Malware: Sign of New Trend?
14-10-2013
Big Data Analytics: Starting Small - Why Experts Recommend an Incremental Approach
12-10-2013
ENISA Offers Incident Response Advice
12-10-2013
Need Security Help? Hire A Picture Card
12-10-2013
Don't Let 'Spooks' Get Your Cloud Data
12-10-2013
Google pays coders to improve open-source security
12-10-2013
Japan in Dire Need of Cyber Security Pros
11-10-2013
Network Solutions investigating DNS hijack
11-10-2013
Law enforcement hunt Silk Road sellers on illicit marketplaces in the hidden Web
11-10-2013
Battelle deploys quantum key-protected network in full production
11-10-2013
Cyber Security Summit
10-10-2013
Several top websites use device fingerprinting to secretly track users
09-10-2013
Call for Nominations: SANS Presents: People Who Made a Difference In Security in 2013
08-10-2013
The Cities With The Most Computer Science Jobs
08-10-2013
RSA Europe 2013 to get practical about big data
08-10-2013
Raising awareness quickly: A brief overview on phishing - See more at: http://www.networkworld.com/news/2013/100713-raising-awareness-quickly-a-brief-274587.html#sthash.WWDXW2vx.dpuf
08-10-2013
WHMCS Zero-Day vulnerability used against PureVPN
08-10-2013
Researchers Examine Depths of Cybercrime in Deep Web
08-10-2013
Despite Data Privacy Scandal, No Deal Yet on New EU Laws
03-10-2012
HSTS becomes IETF proposed standard (The H Security 2012-10-03), by Dj Walker-Morgan
03-10-2012
NIST names Keccak hashing algorithm as SHA-3 (The H Security 2012-10-03), by Fabian Schreschel
03-10-2012
4.5 million routers hacked (The H Security 2012-10-03), by Sara Nottingcham
23-09-2012
Brute-force attack on Oracle passwords feasible (The H Security 2012-09-22), by Chris von Eitzen
16-09-2012
Manipulated data causes BIND DNS servers to crash (The H Security 2012-09-14), by Chris von Eitzen
16-09-2012
Vulnerability in SSL encryption is barely exploitable (The H Security 2012-09-14), by Dj Walker-Morgan
13-09-2012
BlackHole 2.0: Criminals take to the cloud (The H Security 2012-09-13), by Chris von Eitzen
13-09-2012
EU gets Computer Emergency Response Team (The H Security 2012-09-12), by Dj Walker-Morgan
07-09-2012
BEAST creators develop new SSL attack (The H Security 2012-09-06), by Dj Walker-Morgan
02-09-2012
Only 9 of 22 virus scanners block Java exploit (The H Security 2012-08-31), by Dj Walker-Morgan
02-09-2012
The new Java 0Day examined (The H Security 2012-08-29), by Chris von Eitzen
02-09-2012
NFC token for Android smartphones (The H Security 2012-08-28), by Fabian Schreschel
06-05-2012
Critical open hole in PHP creates risks (The H Security 2012-05-03), by Dj Walker-Morgan
06-05-2012
Skype divulges user IP addresses (The H Security 2012-04-30), by Chris von Eitzen
06-05-2012
Oracle databases vulnerable to injected listeners (The H Security 2012-04-29), by Dj Walker-Morgan
06-05-2012
Hotmail hacked for $20 (The H Security 2012-04-27), by Dj Walker-Morgan
06-05-2012
Austrian ID card vulnerable to spoofing attack (The H Security 2012-04-19), by Fabian Schreschel
06-05-2012
Flashback trojan exploits unpatched Java vulnerability (The H Security 2012-04-3), by Chris von Eitzen
06-05-2012
Facebook SDK hole leaves accounts vulnerable (The H Security 2012-04-12), by Chris von Eitzen
01-04-2012
Doubts over necessity of SHA-3 cryptography standard (The H Security 2012-03-30), by Chris von Eitzen
01-04-2012
European Commission wants a cybercrime centre (The H Security 2012-03-29), by Dj Walker-Morgan
01-04-2012
Pwn2Own ends with three browsers felled (The H Security 2012-03-12), by Dj Walker-Morgan
01-04-2012
US e-voting system cracked in less than 48 hours (The H Security 2012-03-05), by Fabian Schreschel
01-04-2012
RSA keys not as random as they should be (The H Security 2012-02-16), by Chris von Eitzen
01-04-2012
Satellite phone encryption cracked (The H Security 2012-02-08), by Dj Walker-Morgan
01-02-2012
Hacker extracts RFID credit card details (The H Security 2012-02-01), by Edward Henning
01-02-2012
New attacks on GSM mobiles and security measures shown (The H Security 2011-12-28), by Dj Walker-Morgan
01-02-2012
Carrier IQ finds bug that has been saving SMS texts (The H Security 2011-12-13), by Dj Walker-Morgan
01-02-2012
Report: Android malware continues to rise (The H Security 2011-11-16), by Chris von Eitzen
18-11-2011
The Face Unlock feature in Android 4.0 is compromised using a picture on another smartphone (The H Security 2011-11-15), by Laura Czajkowski
18-11-2011
Android malware continues to rise (The H Security 2011-11-16), by Chris von Eitzen
06-11-2011
Thousands of WordPress blogs hijacked to deploy malicious code (The H Security 2011-11-03), by Dj Walker-Morgan
06-11-2011
CAPTCHA schemes still easy to bypass (The H Security 2011-11-04), by Dj Walker-Morgan
31-10-2011
Further evidence of Certificate Authority break-ins (The H Security 2011-10-26), by Edward Henning
31-10-2011
Attacking from the side (The H Security 2011-10-28), by Chris von Eitzen
25-10-2011
iPad 2: magnet bypasses passcode lock (The H Security 2011-10-21), by Chris von Eitzen
25-10-2011
Kaspersky discovers new version of German state-sponsored trojan (The H Security 2011-10-19), by Chris von Eitzen
25-10-2011
24 year old student lights match: Europe versus Facebook (Identity Weblog), by Kim Cameron
25-10-2011
OpenCL Password Cracker for RAR files (Geeks3D 2011-10-19)
25-10-2011
XML encryption standard is insecure (The H Security 2011-10-20), by Chris von Eitzen
12-10-2011
German researchers crack RFID cards (The H Security 2011-10-11), by Dj Walker-Morgan
09-10-2011
Diebold e-voting systems vulnerable to attack (The H Security 2011-09-30), by Chris von Eitzen
09-10-2011
Backdoor in HTC Android smartphones (The H Security 2011-10-03), by Dj Walker-Morgan
09-10-2011
Apache hole allows attackers to access internal servers (The H Security 2011-10-06), by Edward Henning
01-10-2011
Mozilla considers disabling Java in Firefox .. to prevent SSL/TLS vulnerability (The H Open 2011-09-29), by Chris von Eitzen
01-10-2011
Microsoft releases fix-it tools for SSL/TLS vulnerability (The H Security 2011-09-27), by Edward Henning
01-10-2011
First solutions for SSL/TLS vulnerability (The H Security 2011-09-26), by Dj Walker-Morgan
01-10-2011
Tool cracks SSL cookies in just ten minutes (The H Security 2011-09-20), by Chris von Eitzen
01-03-2011
Anonymous makes a laughing stock of HBGary (The H Security 2011-02-28), by Jürgen Schmidt
01-03-2011
Security concerns over new Thunderbolt I/O technology (The H Security 2011-02-25)
24-02-2011
Security vulnerabilities galore in social networks (The H Security 2011-02-24)
23-02-2011
Cerf: 2011 Will Be Proving Point for 'InterPlanetary Internet' Network World (02/18/11) Julie Bort
23-02-2011
SSDs Harder to Securely Purge of Data Than HDDs eWeek (02/18/11) Fahmida Y. Rashid
23-02-2011
Security and Privacy Issues in the PDF Document Format Universidad Politecnica de Madrid (Spain) (02/17/11) Eduardo Martinez
22-02-2011
You Know Those Obnoxious Posters Who Almost Seem Like Alter Egos Of The Same Person? They Actually Might Be ... (Washington's Blog 2011-02-18)
20-02-2011
Cryptographers Debate Role in 'Post-Security' Era EE Times (02/16/11) Dylan McGrath
20-02-2011
Why the Cabinet Office’s £27bn cyber crime cost estimate is meaningless
18-02-2011
More background on the US security firm break-in by Anonymous (The H Security 2011-02-17)
18-02-2011
Hardware keyloggers found in public libraries (The H Security 2011-02-15)
18-02-2011
Egypt Leaders Found 'Off' Switch for Internet New York Times (02/15/11) James Glanz; John Markoff
18-02-2011
Can 'Encrypted Blobs' Help With Secure Cloud Computing? Network World (02/04/11) Ellen Messmer
18-02-2011
Quantum Cryptography Is Not Picky, Physicists Prove University of Warsaw (02/02/11)
18-02-2011
National Competition Puts High Schoolers to the Cyber Warrior Test Government Computer News (01/31/11) William Jackson
18-02-2011
Resolution Urges White House to Keep UN Away From Net National Journal (01/26/11) Juliana Gruenwald
18-02-2011
European Project Keeps Personal Details Private eWeek Europe (United Kingdom) (01/31/11) Eric Doyle
18-02-2011
A Research Study Identifies Who Uploads the Majority of the Content to the P2P Piracy Networks Carlos III University of Madrid (Spain) (01/25/11)
18-02-2011
Unhackable Data in a Box of Bacteria: Future of InfoSec? Computerworld (01/18/11) Darlene Storm
18-02-2011
Giving Hackers a Printed Invitation Technology Review (01/21/11) Robert Lemos
18-02-2011
Securing the Cloud University of Texas at Austin (01/20/11) Daniel Oppenheimer
18-02-2011
Keeping Your Digital Secrets Safe American Friends of Tel Aviv University (01/18/11)
10-01-2011
'SMS of Death' Could Crash Many Mobile Phones Technology Review (01/04/11) Erica Naone
10-01-2011
U.Va. Computer Scientists Look to Biological Evolution to Strengthen Computer Software UVA Today (01/04/11) Zak Richards
10-01-2011
Why Are Health Data Leaking Online? Bad Software, Study Says Wall Street Journal (01/03/11) Jennifer Valentino-DeVries
10-01-2011
1986 Privacy Law Is Outrun by the Web New York Times (01/09/11) Miguel Helft; Claire Cain Miller
10-01-2011
And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition NIST News (01/05/11) Chad Boutin
15-11-2010
Chip-and-PIN Crack Code Released as Open Source ZDNet UK (10/25/10) Tom Espiner
15-11-2010
Study Finds Support for Presidential Net 'Kill Switch' CNet (10/27/10) Lance Whitney
15-11-2010
Piracy Technology to Revolutionize Market Research in Cinema University of the West of England, Bristol (11/01/10)
15-11-2010
EU Seeks Tougher Online Code in Bid to Safeguard Private Data Wall Street Journal (11/05/10) John W. Miller
15-11-2010
Stage Set for Showdown on Online Privacy New York Times (11/09/10) Edward Wyatt; Tanzina Vega
15-11-2010
European Cyber Defenses 'Must Improve,' Tests Show BBC News (11/10/10)
15-11-2010
Symantec: We finally understand Stuxnet
15-11-2010
Symantec: We finally understand Stuxnet
28-09-2010
U.S. Wants to Make It Easier to Wiretap the Internet New York Times (09/27/10) P. A1 Charles Savage
28-09-2010
China's 'Big Hole' Marks Scale of Supercomputing Race Computerworld (09/24/10) Patrick Thibodeau
28-09-2010
Automated Biometric Recognition Technologies 'Inherently Fallible,' Better Science Base Needed National Academy of Sciences (09/24/10) Molly Galvin ; Christopher White
27-08-2010
More Accurate Than Heisenberg Allows? Ludwig-Maximilians-Universitat Munchen (07/27/10)
27-08-2010
UMass Amherst Computer Scientists Help Police Apprehend Internet Child Pornographers University of Massachusetts Amherst (08/03/10) Lathrop, Janet
27-08-2010
Wanted: Cybersecurity Pros Baltimore Sun (08/01/10) Sentementes, Gus G.
27-08-2010
HP Researcher Claims to Crack Compsci Complexity Conundrum IDG News Service (08/09/10) Jackson, Joab
27-08-2010
How an Ancient Printer Can Spill Your Most Intimate Secrets The Register (UK) (08/10/10) Goodin, Dan
27-08-2010
Teraflop Troubles: The Power of Graphics Processing Units May Threaten the World’s Password Security System Georgia Tech Research Institute (08/10/10) Englehardt, Kirk J.; Toon, John
27-08-2010
Browsers' Private Modes Leak Info, Say Researchers InfoWorld (08/11/10) Keizer, Gregg
27-08-2010
WVU Researchers Develop Data Sharing Network 'Science 2.0' State Journal (WV) (08/09/10) Moniot, Stacy
27-08-2010
Experts Warn of a Weak Link in the Security of Web Sites New York Times (08/13/10) Helft, Miguel
27-08-2010
Smudges on Touchscreen Phones Could Reveal User Passwords Cellular-News (08/12/10)
27-08-2010
Step 1: Post Elusive Proof. Step 2: Watch Fireworks New York Times (08/16/10) Markoff, John
27-08-2010
Mobile Flaw Could Cloak Clicks Technology Review (08/17/10) Lemos, Robert
27-08-2010
China's Secure Communications Quantum Leap Asia Times (08/26/10) Luce, Matthew
27-08-2010
UALR Research Creates Internet Privacy Tool University of Arkansas at Little Rock (08/24/10)
27-08-2010
U.S. Military Wants to Exert Influence Over Private Cyber Infrastructure Network World (08/26/10) Greene, Tim
27-08-2010
EU Cyber Assault Would Cost 86 Million Pounds, Expert Says EU Observer (Belgium) (08/25/10) Rettman, Andrew
27-08-2010
Shake to Adjust Your Smartphone's Privacy Settings New Scientist (08/25/10) Morgan, Gareth
23-06-2010
Get Smart: Targeting Phone Security Flaws Wall Street Journal (06/15/10) P. B1; Ante, Spencer E.
23-06-2010
Why Can't Johnny Develop Secure Software? Dark Reading (06/16/10) Wilson, Tim
23-05-2010
'Tamper Evident' CPU Warns of Malicious Backdoors The Register (UK) (05/12/10) Goodin, Dan
23-05-2010
Physicists Use Location to Guarantee Security of Quantum Messages Technology Review (05/13/10)
23-05-2010
Protecting Websites From Shared Code Technology Review (05/20/10) Naone, Erica
23-05-2010
History of Social Network Use Reveals Your Identity New Scientist (05/18/10) Giles, Jim
23-05-2010
Risk of Cyberattacks Growing: CSIS Memo CBC News (Canada) (05/18/10) DeCillia, Brooks
23-05-2010
P2P Networks a Treasure Trove of Leaked Health Care Data, Study Finds Computerworld (05/17/10) Vijayan, Jaikumar
23-05-2010
Cyber Challenge: 10,000 Security Warriors Wanted Campus Technology (05/14/10) Schaffhauser, Dian
25-03-2010
Cyber Warriors The Atlantic (03/10) Vol. 305, No. 2, P. 58; Fallows, James
21-03-2010
How Privacy Vanishes Online New York Times (03/16/10) Lohr, Steve
21-03-2010
Dismantling of Saudi-CIA Web Site Illustrates Need for Clearer Cyberwar Policies Washington Post (03/19/10) P. A1; Nakashima, Ellen; Priest, Dana; DeYoung, Karen
21-03-2010
Web Sites That Can Take a Punch MIT News (03/17/10) Hardesty, Larry
10-03-2010
Hunting Mobile Threats in Memory Technology Review (03/05/10) Naone, Erica
10-03-2010
The Next Secure Hash Algorithm Had Better Be a Good One Government Computer News (03/03/10) Jackson, William
05-03-2010
US Plan to Make Hacking Harder Revealed; Financial Times (03/03/10) P. 4; Menn, Joseph
05-03-2010
Attack Unmasks User Behind the Browser; Dark Reading (02/23/10) Higgins, Kelly Jackson
03-03-2010
How to Spot Suspicious VoIP Signals; Technology Review (02/25/10)
03-03-2010
In Networks We Trust; ICT Results (02/24/10)
03-03-2010
The Safe Way to Use One Internet Password; Queensland University of Technology (02/25/10) Wilson, Rachael
03-03-2010
GPS Vulnerable to Hacker Attacks; BBC News (02/23/10) Palmer, Jason
24-02-2010
Secure Radio Signal for Central Locking Fraunhofer-Gesellschaft (02/10)
24-02-2010
'Rugged' Initiative Brings Secure Software Development to the Masses DarkReading (02/05/10) Higgins, Kelly Jackson
24-02-2010
Truly Random Numbers AlphaGalileo (02/22/10)
24-02-2010
Battling Zombies, Botnets and Torpig University of Calgary (02/17/10)
22-01-2010
Windows hole discovered after 17 years - Update
22-01-2010
Tor Project infrastructure updates in response to security breach
21-01-2010
Companies Fight Endless War Against Computer Attacks New York Times (01/17/10) Lohr, Steve
21-01-2010
Today's Threat: Computer Network Terrorism University of Haifa (01/17/10)
14-01-2010
Google Threatens to Leave China After Attacks on Activists' E-mail Washington Post (01/13/10) P. A1; Nakashima, Ellen; Mufson, Steven; Pomfret, John; et al.
14-01-2010
Fixing a Hole in the Web Technology Review (01/12/10) Naone, Erica
14-01-2010
Cryptographic Showdown, Round 2: NIST Picks 14 Hash Algorithms Government Computer News (01/05/10) Jackson, William
12-01-2010
Wanted: Cyber Ninjas New York Times (01/03/10) Drew, Christopher
12-01-2010
Queue ICPC Challenge ACM (01/11/10)
12-01-2010
Airline Security: The Technical Task of Connecting Dots InformationWeek (01/07/10) Foley, John
07-01-2010
K-State Computer Scientists Developing Techniques to Strengthen the Security of Information Systems for Health Care, Military Data Kansas State University News (01/05/10) Hatcliff, John
04-01-2010
New Game for PlayStation 3: Crunching Numbers San Francisco Chronicle (12/05/09) Martinez-Cabrera, Alejandro
04-01-2010
Carnegie Mellon Researcher Says Privacy Concerns Could Limit Benefits From Real-Time Data Analysis Carnegie Mellon News (12/17/09) Spice, Byron
04-01-2010
Carnegie Mellon Researcher Says Privacy Concerns Could Limit Benefits From Real-Time Data Analysis Carnegie Mellon News (12/17/09) Spice, Byron
04-01-2010
Carnegie Mellon Researcher Says Privacy Concerns Could Limit Benefits From Real-Time Data Analysis Carnegie Mellon News (12/17/09) Spice, Byron
04-01-2010
Carnegie Mellon Researcher Says Privacy Concerns Could Limit Benefits From Real-Time Data Analysis Carnegie Mellon News (12/17/09) Spice, Byron
04-01-2010
Cellphone Encryption Code Is Divulged New York Times (12/29/09) P. B3; O'Brien, Kevin J.
04-01-2010
First Programmable Quantum Computer Created Science News (12/19/09) Vol. 176, No. 13, P. 13; Sanders, Laura
17-12-2009
Scientists Promise an End to Web Attacks V3.co.uk (12/07/09) Neal, David
17-12-2009
In Shift, U.S. Talks to Russia on Internet Security New York Times (12/13/09) P. A1; Markoff, John; Kramer, Andrew E.
16-11-2009
How Secure Is Cloud Computing? Technology Review (11/16/09) Talbot, David
14-11-2009
Rutgers Computer Scientists Work to Strengthen Online Security Rutgers University (11/09/09) Blesch, Carl
14-11-2009
University of Basque Country Research Proposes Improvements for Electronic Voting by Internet Basque Research (11/09/09) Bulegoa, Prentsa
14-11-2009
Web Security Tool Copies Apps' Moves Technology Review (11/09/09) Mims, Christopher
14-11-2009
Breaking the Botnet Code Technology Review (11/11/09) Lemos, Robert
14-11-2009
India Prof Tips Fastest Prime Number Detection Algorithm EE Times India (11/13/09)
14-11-2009
Super-Fast Quantum Computer Gets Ever Closer: Quantum Particles Pinned Down Netherlands Organization for Scientific Research (NWO) (11/09/09)
14-11-2009
NIST Test Proves 'the Eyes Have It' for ID Verification National Institute of Standards and Technology (11/03/09) Brown, Evelyn
11-11-2009
First Test for Election Cryptography Technology Review (11/02/09) Naone, Erica
11-11-2009
Animated Ink-Blot Images Keep Unwanted Bots at Bay New Scientist (11/03/09) Barras, Colin
11-11-2009
New Honeypot Mimics the Web Vulnerabilities Attackers Want to Exploit Dark Reading (10/29/09) Higgins, Kelly Jackson
11-11-2009
Will Smart Grid power IPv6? Network World (10/29/09) Marsan, Carolyn Duffy
11-11-2009
A New System Preserves the Right to Privacy in Internet Searches Plataforma SINC (11/05/09)
11-11-2009
Unlimited Compute Capacity Coming, IBM Says Computerworld Canada (11/03/09) Ruffolo, Rafael
11-11-2009
Is AES Encryption Crackable? TechNewsWorld (11/03/09) Germain, Jack M.
31-10-2009
Are Militaries Lagging Their Non-State Enemies in Terms of Use of Internet? An Interview With Chris Gunderson Ubiquity (10/09) Vol. 10, No. 10, Denning, Peter
31-10-2009
Telecoms: Commission steps up UK legal action over privacy and personal data protection
26-10-2009
Scan of Internet Uncovers Thousands of Vulnerable Embedded Devices Wired News (10/23/09) Zetter, Kim
26-10-2009
NSF Awards Wetzel & Lechler $144,000 for 2-Year Information Security Management Study Stevens Institute of Technology (10/22/09) Berzinski, Patrick A.
26-10-2009
California Investigating Problems With Voting-Machine Audit Logs Wired News (10/22/09) Zetter, Kim
26-10-2009
Fingerprint Technology Beats World's Toughest Tests...Including 100s of Builders' Thumbs University of Warwick (10/26/09) Dunn, Peter
25-10-2009
Quantum Computers Could Tackle Enormous Linear Equations Science News (10/16/09) Sanders, Laura
25-10-2009
Vulnerability Seen in Amazon's Cloud-Computing Technology Review (10/23/09) Talbot, David
25-10-2009
To Protect Your Privacy, Hand Over Your Data New Scientist (10/22/09) Venkatraman, Vijaysree
20-10-2009
Q&A: Defcon's Jeff Moss on Cybersecurity, Government's Role CNet (10/16/09) Mills, Elinor
20-10-2009
Tracking Devious Phishing Websites Technology Review (10/16/09) Naone, Erica
20-10-2009
UAB International Conference Focuses on Preventing High-Capacity Computer Data Theft University of Alabama at Birmingham (10/14/09) Hayenga, Andrew
20-10-2009
Field Experiment on a Robust Hierarchical Metropolitan Quantum Cryptography Network Science in China Press (10/16/09) ZhengFu, Han
18-10-2009
Seeking Privacy in the Clouds Duke University News & Communications (10/13/09) Basgall, Monte
18-10-2009
Household Robots Do Not Protect Users' Security and Privacy, Researchers Say UW News (10/08/09) Hickey, Hannah
18-10-2009
Securing the Web MIT News (10/08/09) Hardesty, Larry
10-10-2009
Prototype Security Software Blocks DDoS Attacks Network World (10/05/09) Greene, Tim
07-10-2009
New Digital Security Program Doesn't Protect as Promised University of Texas at Austin (09/29/09)
07-10-2009
Researchers Hijack a Drive-By Botnet Technology Review (10/02/09) Lemos, Robert
30-09-2009
Ants Versus Worms: Computer Security Mimics Nature Wake Forest University (09/21/09) Frazier, Eric
30-09-2009
Pedestrian Crossings Could Be Monitored Plataforma SINC (09/18/09)
25-09-2009
EU Funding 'Orwellian' Artificial Intelligence Plan to Monitor Public for 'Abnormal Behaviour' Telegraph.co.uk (09/19/09) Johnston, Ian
25-09-2009
Project 'Gaydar' Boston Globe (09/20/09) Johnson, Carolyn Y.
25-09-2009
Surveillance Software Solves Security Snag University of Adelaide (09/14/09) Gibson, Candace
25-09-2009
FBI’s Data-Mining System Sifts Airline, Hotel, Car-Rental Records Wired News (09/23/09) Singel, Ryan
25-09-2009
Controlling the Language of Security Science Centric (09/19/09)
25-09-2009
Study Shows Improvements in Quality of Open Source Code IDG News Service (09/23/09) Kanaracus, Chris
25-09-2009
UK's Centre for Cyber-Security Opens at Queen's Queen's University Belfast (09/23/09) McElroy, Lisa
17-09-2009
Can You Trust Crowd Wisdom? MIT Technology Review (09/16/09) Grifantini, Kristina
17-09-2009
On the Road to Secure Car-to-Car Communications ICT Results (09/14/09)
17-09-2009
AFOSR Funds Super-Fast, Secure Computing Air Force Print News (DC) (09/08/09) Callier, Maria
10-09-2009
Privacy Plug-In Fakes Out Facebook Technology Review (09/09/09) Lemos, Robert
10-09-2009
Researchers Find a New Way to Attack the Cloud IDG News Service (09/03/09) McMillan, Robert
06-09-2009
Still Trying to Crack Nazi Enigma Messages Network World (08/31/09) Brown, Bob
06-09-2009
Adding Trust to Wikipedia, and Beyond Technology Review (09/04/09) Naone, Erica
06-09-2009
Quantum Computer Slips Onto Chips BBC News (09/04/09)
29-08-2009
Defying Experts, Rogue Computer Code Still Lurks New York Times (08/26/09) Markoff, John
29-08-2009
New Attack Cracks Common Wi-Fi Encryption in a Minute IDG News Service (08/27/09) McMillan, Robert
27-08-2009
Safer Software The Engineer Online (08/12/09)
27-08-2009
China Pulls Back From Edict on Web-Filtering Software Wall Street Journal (08/14/09) P. A7; Back, Aaron
27-08-2009
RFID Tags Get an Intelligence Upgrade New Scientist (08/14/09) Kleiner, Kurt
27-08-2009
Hong Kong Center Aims to Put China at the Forefront of RFID Growth RFID Journal (08/18/09) Friedlos, Dave
27-08-2009
Grid Computing, the New Commodity ICT Results (08/24/09)
27-08-2009
Researchers Report Progress on Parallel Path EE Times (08/24/09) Merritt, Rick
27-08-2009
Another New AES Attack
10-07-2009
Weakness in Social Security Numbers Is Found The New York Times (07/06/09) Markoff, John
10-07-2009
Researchers Unite to Distribute Quantum Keys Institute of Physics (07/07/09)
10-07-2009
Twente Researcher Develops Self-Learning Security System for Computer Networks University of Twente (07/01/09) Bruysters, Joost
10-07-2009
Building a Crash-Proof Internet New Scientist (06/29/09) Daviss, Bennett
07-07-2009
Cybersecurity Plan to Involve NSA, Telecoms The Washington Post (07/03/09) P. A1; Nakashima, Ellen; Hsu, Spencer S.; Johnson, Carrie
07-07-2009
U.S. Takes Aim at Cyberwarfare The Washington Times (07/02/09) P. B1; Waterman, Shaun
03-07-2009
Chinese Delay Plan for Censor Software Wall Street Journal (07/01/09) P. A1; Chao, Loretta; Dean, Jason; Lin, Bai; et al.
01-07-2009
IBM Claims Privacy Breakthrough for Cloud, Data InternetNews.com (06/25/09) Goldman, Alex
01-07-2009
Metro Control System Fails Test Washington Post (06/26/09) P. A2; Sun, Lena H.; Glod, Maria
01-07-2009
New Internet2 CTO Pushes Multicast, IPv6 Network World (06/23/09) Marsan, Carolyn Duffy
01-07-2009
Computer Failures Are Probed in Jet Crash Wall Street Journal (06/27/09) P. A1; Pasztor, Andy; Michaels, Daniel
01-07-2009
Metrorail Crash May Exemplify Automation Paradox Washington Post (06/29/09) P. A9; Vedantam, Shankar
01-07-2009
U.S. and Russia Differ on a Treaty for Cyberspace New York Times (06/28/09) P. A1; Markoff, John; Kramer, Andrew E.; Wong, Edward; et al.
01-07-2009
Holt: When it Comes to Voting, a Paper Ballot System Is a Must NewJerseyNewsroom.com (06/22/09) Lagomarsino, Andy
23-06-2009
EU Lays Out Plans for the 'Internet of Things' VNUNet (06/18/09) Bailey, Dave
23-06-2009
When your yogurt pots start talking to you: Europe prepares for the internet revolution
21-06-2009
China Intent on Requiring Internet Censor Software New York Times (06/19/09) P. A8; Wong, Edward; Vance, Ashlee
21-06-2009
Contracts Without Lawyers? ICT Results (06/19/09)
21-06-2009
Spanish and Estonian sites sign the Safer Social Networking Principles for the EU
13-06-2009
China Faces Criticism Over New Software Censor New York Times (06/10/09) Jacobs, Andrew; Yang, Xiyun
13-06-2009
Software Liability Law Could Divide Open Source ZDNet Asia (06/10/09) Ho, Victoria
13-06-2009
The Internet Is Incomplete, Says its Co-Designer, Vinton Cerf Computerworld (06/11/09) Thibodeau, Patrick
13-06-2009
Social Networks Keep Privacy in the Closet Technology Review (06/11/09) Naone, Erica
13-06-2009
Experts Urge Federal Efforts on Cybersecurity Federal Computer Week (06/10/09) Bain, Ben
10-06-2009
Is the Hacking Threat to National Security Overblown? Wired News (06/03/09) Singel, Ryan
09-06-2009
Lawmakers: Keep ICANN Oversight With US IDG News Service (06/04/09) Gross, Grant
09-06-2009
Study: Web Trackers Systematically Compromise Users' Privacy Dark Reading (06/03/09) Wilson, Tim
09-06-2009
Alarm over China web filter pla
06-06-2009
EU Security Agency Warns on European Network Resilience VNUNet (05/28/09) Bailey, Dave
06-06-2009
The Obama Administration's Silence on Privacy New York Times (06/02/09) Hansell, Saul
06-06-2009
NIST Delivers Updated Draft Standards for Electronic Voting Machines NIST Tech Beat (06/02/09) Boutin, Chad
06-06-2009
Is Internet Voting Safe? Vote Here Wired News (06/04/09) Poulsen, Kevin
30-05-2009
Pentagon Plans New Arm to Wage Computer Wars New York Times (05/29/09) P. A1; Sanger, David E.; Shanker, Thom
27-05-2009
Viral Epidemics Poised to Go Mobile National Science Foundation (05/21/09) Van Pay, Lisa; Cruikshank, Dana W.
27-05-2009
Paperless Proof, the E-Government Magic Act ICT Results (05/23/09)
27-05-2009
Online Life Can Be Convenient as Well as Dangerous Pittsburgh Tribune-Review (05/18/09) Heinrichs, Allison M.
27-05-2009
Europe's Fastest Computer Unveiled in Julich Forschungszentrum Julich (05/26/09)
27-05-2009
IPv6 security models and dual-stack (IPv6/IPv4) implications
21-05-2009
Researchers Aim for Cloud Standard Australian IT (05/19/09) Foreshew, Jennifer
21-05-2009
ICANN: Apply Public Health Response Model to E-Security IDG News Service (05/18/09) Gliddon, Joshua
19-05-2009
Are Your 'Secret Questions' Too Easily Answered? Technology Review (05/18/09) Lemos, Robert
18-05-2009
Mathematical Advances Strengthen IT Security European Science Foundation (05/11/09) Valleley, Sofia
18-05-2009
racking Cyberspies Through the Web Wilderness New York Times (05/12/09) P. D3; Markoff, John
18-05-2009
ICANN Heading to a Fork in the Road InternetNews.com (05/08/09) Corbin, Kenneth
18-05-2009
A Nimbus Rises in the World of Cloud Computing National Science Foundation (05/08/09) Cruikshank, Dana W.
18-05-2009
World's First Quantum Cryptography Network Developed in China Chinese Academy of Sciences (05/07/2009)
18-05-2009
A Blueprint to Stop Browser Attacks Technology Review (05/14/09) Naone, Erica
18-05-2009
Is the U.S. Ready for Government-Sponsored Cyberattacks? Network World (05/12/09) Messmer, Ellen
13-05-2009
Small chips with big potential: New EU recommendations make sure 21st century bar codes respect privacy
13-05-2009
More harmonised frequencies available for everyday wireless devices
11-05-2009
EC Wants Software Makers Held Liable for Code ZDNet UK (05/08/09) Espiner, Tom
11-05-2009
Cadets Trade the Trenches for Firewalls New York Times (05/11/09) P. A1; Kilgannon, Corey; Cohen, Noam
11-05-2009
Does Anti-Piracy Software on Video Games Open Security Risks on Users' Computers University of Michigan News Service (05/04/09) Moore, Nicole Casal
09-05-2009
Researchers Take Over Dangerous Botnet Dark Reading (05/04/09) Higgins, Kelly Jackson
08-05-2009
If the Face Fits… Inderscience Publishers (04/30/09)
08-05-2009
How Hackers Can Steal Secrets From Reflections Scientific American (04/27/09) Gibbs, W. Wayt
05-05-2009
Europe Funds Secure Operating System Research IDG News Service (04/27/09) Kirk, Jeremy
05-05-2009
Clandestine Defense Hub Prepares to Open at UM Baltimore Sun (04/28/09) Wood, David
05-05-2009
Software: The Eternal Battlefield in the Unending Cyberwars Computerworld (04/27/09) Anthes, Gary
05-05-2009
Web Tool 'as Important as Google' BBC News (04/30/09)
05-05-2009
Sending Cell Phones Into the Cloud Technology Review (05/01/09) Mims, Christopher
27-04-2009
Crowd Forms Against an Algorithm New York Times (04/19/09) P. WK2; Rich, Motoko
27-04-2009
Study: People Manage Their Privacy on Facebook Naturally Helsinki Institute for Information Technology (04/20/09) Noronen, Vis
27-04-2009
Using Technology to Improve Traffic Flow and Road Safety Universitat Politecnica de Catalunya (04/08/09)
27-04-2009
Once Smartphones Become Truly Common, So Will the Viruses That Attack Them Northeastern University News (04/14/09) Nyul, Renata
27-04-2009
Researchers Use Brain Interface to Post to Twitter University of Wisconsin-Madison (04/20/09) Meiller, Renee
27-04-2009
Software Improves P2P Privacy By Hiding in the Crowd Northwestern University News Center (04/08/09)
27-04-2009
Researchers Work on Website Credibility Tests Agence France Presse (04/21/09)
13-04-2009
Improving the Security of Internet Exchanges National Center for Scientific Research (France) (03/13/09) Le Poulennec, Claire
13-04-2009
Vast Spy System Loots Computers in 103 Countries New York Times (03/29/09) Markoff, John
13-04-2009
Experts See Early Activity From the Conficker Worm New York Times (04/01/09) P. A14; Markoff, John
13-04-2009
Intruder Alert: TAU's 'Smart Dew' Will Find You! American Friends of Tel Aviv University (03/26/09)
13-04-2009
Advances in Data Safety Drawing Wider Attention University of Texas at Dallas (03/25/09) Moore, David
13-04-2009
Senate Legislation Would Federalize Cybersecurity The Washington Post (04/01/09) Warrick, Joby; Pincus, Walter
13-04-2009
French Lawmakers Reject Internet Piracy Bill Associated Press (04/09/09) Sayare, Scott
10-02-2009
The Cybercrime Wave; National Journal (02/07/09) Vol. 41, No. 6, P. 22; Harris, Shane
10-02-2009
Google Makes it Easy to Spy on Kids, Workers Associated Press (02/05/09) Liedtke, Michael
10-02-2009
W3C: Interoperability Key to Social Networking eWeek (02/04/09) Taft, Darryl K.
10-02-2009
Researcher Proposes Statistical Method to Enhance Airport Secondary Security Screenings University of Texas at Arlington (02/03/09)
10-02-2009
Mars Rover Recovers After Bout of Amnesia New Scientist (02/03/09) Courtland, Rachel
10-02-2009
RFID's Security Problem Technology Review (02/09) Vol. 112, No. 1, P. 72; Naone, Erica
05-02-2009
Microsoft Releases 'Web Sandbox' as Open Source InternetNews.com (01/28/09) Johnston, Stuart J.
05-02-2009
Europe: Freedom of speech & Internet of the future
05-02-2009
FBI warns of money mule scams
03-02-2009
Worm Infects Millions of Computers Worldwide New York Times (01/23/09) Markoff, John
03-02-2009
Web 3.0 Emerging Computer (01/09) Vol. 42, No. 1, P. 88; Hendler, Jim
18-01-2009
Mystery computer virus brings down Royal Navy email systems
17-01-2009
U.S. Plots Major Upgrade to Internet Router Security Network World (01/15/09) Marsan, Carolyn Duffy
17-01-2009
How We Are Tricked Into Giving Away Our Personal Information Swedish Research Council (01/15/09)
17-01-2009
Low-Cost Strategy Developed for Curbing Computer Worms UC Davis News & Information (01/14/09) Greensfelder, Liese
17-01-2009
Digital Rights War Looms Ahead BBC News (01/13/09) Shiels, Maggie
17-01-2009
Let the Cracking Begin Government Computer News (01/12/09) Jackson, William
17-01-2009
Group Details 25 Most Dangerous Coding Errors Hackers Exploit Computerworld (01/12/09) Vijayan, Jaikumar
17-01-2009
'Smart' Cameras Are Watching You The Lantern (Ohio State University) (01/09/09) Gorder, Pam Frost
21-12-2008
Plugging a Password Leak Technology Review (12/19/08) Kremen, Rachel
21-12-2008
Will Biometrics Measure Up to the Future? CNN (12/13/08) Fong, Cherise
15-12-2008
DHS Creates Privacy Principles for Scientific Research CNet (12/09/08) Condon, Stephanie
15-12-2008
Robust Watermarking Offers Hope Against Digital Piracy ICT Results (12/05/08)
15-12-2008
Hackers, Others Seek DMCA Exemptions Wired News (12/03/08) Kravets, David
15-12-2008
'Privacy Will End in 2013' Financial Times - Digital Business (12/03/08) P. 6; Shillingford, Joia
15-12-2008
Safer, Better, Faster: Addressing Cryptography's Big Challenges ICT Results (12/04/08)
15-12-2008
Thieves Winning Online War, Maybe Even in Your Computer New York Times (12/06/08) P. A1; Markoff, John
15-12-2008
U.S. Is Losing Global Cyberwar, Commission Says BusinessWeek (12/07/08) Epstein, Keith
23-11-2008
The Skein Hash Function
07-11-2008
Reports: WPA Wi-Fi encryption cracked
04-11-2008
Scientists Crack Possible Future Quantum Computer Age Encryption TG Daily (11/03/08) Gruener, Wolfgang
04-11-2008
IBM Researchers Show Off New Weapon in Fight Against Online Fraud eWeek (10/29/08) Prince, Brian
04-11-2008
On Security, Microsoft Reports Progress and Alarm New York Times (11/03/08) P. B9; Markoff, John
04-11-2008
Optical Firewall Aims to Clear Internet Security Bottlenecks ICT Results (10/29/08)
04-11-2008
Computational Pioneer Erez Lieberman Explains How the Web--and Spam--Evolves Computerworld (10/27/08) Forrest, Sara
04-11-2008
If Looks Could Kill Economist (10/25/08) Vol. 389, No. 8603, P. 95
02-11-2008
Princeton Report Rips N.J. E-Voting Machines as Easily Hackable Computerworld (10/27/08) Weiss, Todd R.
02-11-2008
Big Tech Companies Back Global Plan to Shield Online Speech New York Times (10/28/08) P. B8; Helft, Miguel; Markoff, John
02-11-2008
Good Code, Bad Computations: A Computer Security Gray Area UCSD News (10/27/08) Kane, Daniel
02-11-2008
A Picture Is Worth a Thousand Locksmiths UCSD News (10/29/08) Kane, Daniel
23-10-2008
Keyboard Sniffers to Steal Data BBC News (10/21/08)
23-10-2008
Beware the Digital Zombies New York Times (10/21/08) P. B1; Markoff, John
23-10-2008
National Cybersecurity Initiative R&D Effort Launched Federal Computer Week (10/14/08) Bain, Ben
23-10-2008
Commission welcomes European Parliament's strong support for a new Safer Internet Programme
21-10-2008
Giant Database Plan 'Orwellian' BBC News (10/15/08)
21-10-2008
Researchers Expect Hackers to Prey on Cell Phones Associated Press (10/15/08) Robertson, Jordan
21-10-2008
Users, Enterprises Pay for Poor Privacy Policies, Study Says Dark Reading (10/07/08) Wilson, Tim
12-10-2008
Chip-and-pin fraud hits European supermarkets
10-10-2008
Cambridge Lab Sets Quantum Key World Record; Techworld (10/09/08) Dunn, John E.
10-10-2008
Q&A: E-Voting Security Results 'Awful,' Says Ohio Secretary of State; Computerworld (10/08/08) Friedman, Brad
10-10-2008
How Much Security Do You Expect From Your Pacemaker?; University of Massachusetts Amherst (10/03/08)
09-10-2008
To Protect Your Wireless Network, Break It Up; Computerworld Canada (10/01/08) Ruffolo, Rafael
09-10-2008
Study of Data Mining for Terrorists Is Urged; New York Times (10/08/08) P. A20; Lichtblau, Eric
09-10-2008
Study of Data Mining for Terrorists Is Urged; New York Times (10/08/08) P. A20; Lichtblau, Eric
07-10-2008
THC/vonJeek proudly presents an ePassport emulator. This emulator applet allows you to create a backup of your own passport chip(s)
06-10-2008
Peer-to-Peer Networking Takes Internet Out of the Equation ICT Results (10/03/08)
04-10-2008
Surveillance of Skype Messages Found in China New York Times (10/02/08) P. C1; Markoff, John
04-10-2008
Tracking Laptop Thieves Safely Technology Review (09/30/08) Naone, Erica
01-10-2008
Who needs to steal data, when you can buy it on eBay?
29-09-2008
U.S. Urged to Go on Offense in Cyberwar United Press International (09/29/08) Waterman, Shaun
29-09-2008
Wi-Fi Infantry National Journal (09/20/08) Vol. 40, No. 38, P. 30; Freedburg Jr., Sydney J.
29-09-2008
Spoofing GPS Receivers Cornell News (09/19/08) Ju, Anne
27-09-2008
University Students Create a Virtual RFID-Enabled Hospital RFID Journal (09/16/08) Bacheldor, Beth
27-09-2008
Group Pushes Internet Protocol for Sensor Nets EE Times (09/16/08) Merritt, Rick
27-09-2008
reCAPTCHA: Human-Based Character Recognition via Web Security Measures Science (09/12/08) Vol. 321, No. 5895, P. 1465; von Ahn, Luis; Maurer, Benjamin; McMillen, Colin
27-09-2008
Open Source Could Fix E-Voting Flaws, California Secretary of State Says Network World (09/25/08) Brodkin, Jon
20-09-2008
Cyber Attack Data Sharing Is Lacking, Congress Told Washington Post (09/19/08) P. D2; Nakashima, Ellen
18-09-2008
Spy vs spy: Spyware found at Hungarian secret service
16-09-2008
Turning Social Networks Against Users Technology Review (09/15/08) Naone, Erica
16-09-2008
Threat From DNS Bug Isn't Over, Experts Say Dark Reading (09/08/08) Wilson, Tim
16-09-2008
European Institute of Innovation and Technology (EIT) begins its work
13-09-2008
U.N. Agency Eyes Curbs on Internet Anonymity CNet (09/12/08) McCullagh, Declan
12-09-2008
The Risk Factor:How Much Insight Into Our Children's Lives Is too Much?
11-09-2008
Researchers Build Malicious Facebook Application IDG News Service (09/05/08) Kirk, Jeremy
11-09-2008
Real-Life Robots Obey Asimov's Laws ICT Results (09/08/08)
09-09-2008
Protecting Your Vote With Invisible Ink Discover (09/04/08) Lafsky, Melissa
09-09-2008
How a Global Internet Policy Might Look InternetNews.com (08/27/08) Corbin, Kenneth
06-09-2008
MIT Lincoln Laboratory Software Aims to Thwart Cyber Hackers MIT News (08/27/08)
06-09-2008
Indian Researcher's Improved Anti-Hacking System for Wireless Networks Asian News International (09/04/08)
04-09-2008
E-Voting Vendor: Programming Errors Caused Dropped Votes IDG News Service (08/22/08) Gross, Grant
04-09-2008
A New Breed of Hackers Tracks Online Acts of War Washington Post (08/27/08) P. D1; Hart, Kim
04-09-2008
Internet Traffic Begins to Bypass the U.S. New York Times (08/30/08) P. B1; Markoff, John
04-09-2008
Computer Viruses Make it to Orbit BBC News (08/27/08)
04-09-2008
Public, Private Sectors at Odds Over Cyber Security Los Angeles Times (08/26/08) Menn, Joseph
04-09-2008
Terror Threat System Crippled by Technical Flaws, Says Congress Computerworld (08/27/08) Thibodeau, Patrick
04-09-2008
Researchers Craft Multimedia Passwords Techworld (08/14/08) Dunn, John E.
04-09-2008
Hacking Mifare Transport Cards
04-09-2008
The DNS Vulnerability
16-08-2008
Experts Accuse Bush Administration of Foot-Dragging on DNS Security Hole Wired News (08/13/08) Singel, Ryan
16-08-2008
Can Avatars Stop Identity Theft? Salon.com (08/05/08) Caruso, Denise
12-08-2008
Patch for Web Security Hole Has Some Leaks of Its Own New York Times (08/09/08) P. B1; Markoff, John
12-08-2008
MIT Students Ordered to Halt Report on Hacking Subway System Wall Street Journal (08/11/08) P. A4
12-08-2008
Web Privacy on the Radar in Congress New York Times (08/11/08) P. C1; Clifford, Stephanie
12-08-2008
Ohio Official Sues E-Voting Vendor for Lost Votes IDG News Service (08/08/08) Gross, Grant
12-08-2008
Researchers Develop Next-Generation Antivirus System University of Michigan News Service (08/05/08) Moore, Nicol Casal
12-08-2008
Indiana University Department of Computer Science Study Shows Popular Web Sites at Risk for Phishers Indiana University (07/30/08)
12-08-2008
EU Reserves Spectrum for 'Talking' Cars InformationWeek (08/06/08) Perez, Marin
11-08-2008
A Photo That Can Steal Your Online Credentials IDG News Service (08/01/08) McMillan, Robert
11-08-2008
Cloud Computing's Perfect Storm? Technology Review (08/07/08) Borland, John
11-08-2008
Open-Source E-Voting Gets LinuxWorld Test Run Computerworld (08/06/08) Weiss, Todd R.
11-08-2008
EU Opens the Way for 'Cars That Talk' Agence France Presse (08/05/08)
11-08-2008
Hacking Electronic Toll Systems CNet (08/06/08) Mills, Elinor
11-08-2008
EFF Launches Coders' Rights Site at Black Hat Conference Ars Technica (08/06/08) Timmer, John
05-08-2008
Attackers' Behavior Builds Better Blacklists Security Focus (07/24/08) Lemos, Robert
05-08-2008
ALIFE Conference to Reveal Bio-Inspired Spam Detection University of Southampton (ECS) (08/04/08) Lewis, Joyce
31-07-2008
Keeping Up With Your Peers, Securely ICT Results (07/21/08)
31-07-2008
The Open Source Jobs Boom InfoWorld (07/24/08) Snyder, Bill
31-07-2008
RFID Unlocks Supply Chain Potential ICT Results (07/17/08)
31-07-2008
Sun's Fortress Language: Parallelism by Default HPC Wire (07/16/08) Feldman, Michael
31-07-2008
Bluetooth Is Watching: Secret Study Gives Bath a Flavor of Big Brother Guardian (UK) (07/21/08) Lewis, Paul
31-07-2008
With Security at Risk, a Push to Patch the Web New York Times (07/30/08) P. A1; Markoff, John
31-07-2008
How Secure Is Your Network? NIST Model Knows National Institute of Standards and Technology (07/22/08)
31-07-2008
Security Flaws in Online Banking Sites Found to Be Widespread University of Michigan News Service (07/22/08) Moore, Nicole Casal
21-07-2008
Google Is Watching, Perhaps Soon in Your Home InformationWeek (07/11/08) Claburn, Thomas
21-07-2008
DNS Flaw Discoverer Says More Permanent Fixes Will Be Needed Computerworld (07/17/08) Vijayan, Jaikumar
20-07-2008
Goodbye to Faulty Software? ICT Results (07/15/08)
20-07-2008
Quantum Leap Technology Review (07/17/08) Rugani, Lauren
20-07-2008
Enigma Variations Economist (07/10/08) Vol. 388, No. 8588, P. 88
15-07-2008
When the Phone Goes With You, Everyone Else Can Tag Along Washington Post (07/12/08) P. A1; Nakashima, Ellen
15-07-2008
Waiting for the Internet Meltdown Times Online (UK) (07/06/08) Harris, Mark
12-07-2008
Space Station Could Beam Secret Quantum Codes by 2014 Scientific American (06/08) Minkel, J.R.
12-07-2008
Researchers Say Notification Laws Not Lowering ID Theft IDG News Service (06/05/08) McMillan, Robert
12-07-2008
Spying Has Few Legal Checks Baltimore Sun (07/07/08) P. 1A; Olson, Bradley
12-07-2008
A Tax on Buggy Software Forbes (06/26/08) Greenberg, Andy
12-07-2008
Senate Grapples With Web Privacy Issues Washington Post (07/10/08) P. D3; Whoriskey, Peter
12-07-2008
Artificial DNA Can Power Future Comps Times of India (07/07/08)
12-07-2008
New Logic: The Attraction of Magnetic Computation ICT Results (07/07/08)
11-03-2008
China's mobile network: a big brother surveillance tool?
11-03-2008
Dutch Public Transit Card Broken; RFID replay attack allows free travel in The Netherlands
22-02-2008
Commission launches consultation on Radio Frequency Identification (RFID)
18-02-2008
The University's Role in Advancing Data Encryption, TechNewsWorld (11/01/07) Burger, Andrew K.
18-02-2008
'Suicide Nodes' Defend Networks From Within New Scientist (11/01/07) Marks, Paul
18-02-2008
Programmed for Security Government Computer News (11/05/07) Vol. 26, No. 28, Jackson, William
18-02-2008
UN Approves Resolution Related to Cyber Attacks eGov Monitor (11/05/07)
18-02-2008
Human Error Puts Online Banking Security at Risk Queensland University of Technology (11/07/07)
18-02-2008
Web Guru Berners-Lee Warns Against 'Walled Gardens' for the Mobile Internet Network World (11/14/07) Cox, John
18-02-2008
Security Loophole Found in Microsoft Windows University of Haifa (11/12/07)
18-02-2008
Adding Math to List of Security Threats New York Times (11/17/07) P. B4; Markoff, John
18-02-2008
Synchronized Shaking Connects Gadgets Securely New Scientist (11/13/07) Simonite, Tom
18-02-2008
Internet Users Give Up Privacy in Exchange for Trust Economic & Social Research Council (11/26/07)
18-02-2008
Standards Suggested for Writing Secure Java Network World (11/20/07) Greene, Tim
18-02-2008
Cryptic Messages Boost Data Security ICT Results (11/28/07)
15-02-2008
Google Calls for International Standards on Internet Privacy Washington Post (09/15/07) P. D1; Rampell, Catherine
15-02-2008
NSF Researchers Produce RFID Random Number Generator Government Computer News (09/12/07) Jackson, Joab
15-02-2008
University Program Targets Online Security Augusta Chronicle (GA) (09/12/07) Few, Jenel
15-02-2008
Quantum Threat to Our Secret Data New Scientist (09/13/07) Vol. 195, No. 2621, P. 30; Graham-Rowe, Duncan
15-02-2008
Clock to Tick Down U.S. Privacy Washington Times (09/18/07) P. A3; Hudson, Audrey
15-02-2008
If RSA Is Cracked, Here's Plan B New Scientist (09/15/07) Vol. 195, No. 2621, P. 31; Graham-Rowe, Duncan
15-02-2008
NSA to Defend Against Hackers Baltimore Sun (09/20/07) P. 1A; Gorman, Siobhan
15-02-2008
Does Antivirus Have a Future? London Guardian (09/20/07) Grossman, Wendy M.
15-02-2008
Not Much Anonymity for Unprotected File-Sharers University of California, Riverside (09/25/07)
15-02-2008
Using Spam Blockers to Target HIV, Too BusinessWeek (10/01/07)No. 4052, P. 68; Baker, Stephen; Greene, Jay
15-02-2008
Scientists Warn of 'Vocal Terror' BBC News (09/14/07) Seward, Liz
15-02-2008
You Can Put Your Trust in Wikipedia 2.0 New Scientist (09/22/07) Vol. 195, No. 2622, P. 28; Giles, Jim
15-02-2008
CERT Advances Secure Coding Standards Dark Reading (10/02/07) Higgins, Kelly Jackson
15-02-2008
Hackers Could Skew US Elections New Scientist (10/09/07) Marshall, Jessica
15-02-2008
Data Sharing Threatens Privacy Nature (10/11/07) Vol. 449, No. 7163, P. 644
15-02-2008
Watermarks for Mobile Television Fraunhofer-Gesellschaft (10/07)
15-02-2008
Scientists Draw on New Technology to Improve Password Protection Newcastle University (10/24/07)
15-02-2008
Identity Theft: Costs More, Tech Less Network Computing (10/23/07) Claburn, Thomas
15-02-2008
Password-Cracking Chip Causes Security Concerns New Scientist (10/24/07) Brandt, Andrew
15-02-2008
Germany Seeks Expansion of Computer Spying Los Angeles Times (10/30/07) Murphy, Kim
22-09-2007
Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise Wired News (09/10/07) Zetter, Kim
22-09-2007
University Program Targets Online Security Augusta Chronicle (GA) (09/12/07) Few, Jenel
22-09-2007
Quantum Threat to Our Secret Data New Scientist (09/13/07) Vol. 195, No. 2621, P. 30; Graham-Rowe, Duncan
22-09-2007
If RSA Is Cracked, Here's Plan B New Scientist (09/15/07) Vol. 195, No. 2621, P. 31; Graham-Rowe, Duncan
22-09-2007
NSA to Defend Against Hackers Baltimore Sun (09/20/07) P. 1A; Gorman, Siobhan
21-09-2007
Storm Worm Botnet More Powerful Than Top Supercomputers InformationWeek (09/06/07) Gaudin, Sharon
21-09-2007
Debate Rages Over German Government Spyware Plan IDG News Service (09/05/07) Blau, John
21-09-2007
Personal Data: Up Close and Impersonal Federal Computer Week (08/27/07) Joch, Alan
21-09-2007
Who Needs Hackers? New York Times (09/12/07) P. H1; Schwartz, John
21-09-2007
China's Eye on the Internet University of California, Davis (09/11/07) Fell, Andy
08-09-2007
Cyber Crime Tool Kits Go on Sale BBC News (09/04/07)
02-09-2007
How Close Is World War 3.0? Network World (08/22/07) Marsan, Carolyn Duffy
02-09-2007
Japan Working to Replace the Internet Kyodo News (08/20/07)
02-09-2007
Hacktivism Attacks May Rise, Homeland Security Official Warns Network World (08/22/07) Marsan, Carolyn Duffy
02-09-2007
A New Method to Detect Software Theft Informationsdienst Wissenschaft (08/23/07)
02-09-2007
America's Hackable Backbone Forbes (08/22/07) Greenberg, Andy
02-09-2007
UM Study: Password Protecting Your Wireless Network Is Not Enough University of Maryland (08/22/07) Corley, Missy; Copeland, Rebecca
02-09-2007
Creating a Computer Currency Harvard University Gazette (08/29/07) Powell, Alvin
02-09-2007
Freedom Key to Web Evolution, Says Guru Financial Times (08/31/07) P. 11; Edgecliffe-Johnson, Andrew
02-09-2007
Ad-Hoc Network Probes Links for Smoother Calls New Scientist (08/29/07) Reilly, Michael
02-09-2007
Statistics Professor Says Databases Must Balance Privacy, Utility Carnegie Mellon News (08/30/07) Potts, Jonathan
02-09-2007
Horizon Awards 2007: Bitty Bytes Computerworld (08/20/07) Vol. 41, No. 34, P. 44; Anthes, Gary
02-09-2007
Squashing Worms Science News (08/25/07) Vol. 172, No. 8, Rehmeyer, Julie J.
21-08-2007
Phishing Researcher 'Targets' the Unsuspecting Network World (08/13/07) Vol. 24, No. 31, P. 26; Brodkin, Jon
21-08-2007
Cracking the Cube Science News (08/11/07) Vol. 172, No. 6,
21-08-2007
New URI Browser Flaws Worse Than First Thought IDG News Service (08/15/07) McMillan, Robert
19-08-2007
Scan this Guy's E-Passport and Watch Your System Crash Wired News (08/01/07) Zetter, Kim
19-08-2007
Securing Cell Phones Technology Review (08/01/07) Greene, Kate
19-08-2007
Stanford Confabs Explore Multi-Core CPUs, Nets EE Times (07/30/07) Merritt, Rick
19-08-2007
Security: A Business Enabler, Not Disabler Baseline (07/07)No. 74, P. 41; McCormick, John
19-08-2007
E-Voting Systems Vulnerable to Viruses and Other Security Attacks, New Report Finds UC Berkeley News (08/02/07) Yang, Sarah
19-08-2007
How Far Could Cyber War Go? Network World (07/26/07) Kabay, M.E.
19-08-2007
The New Face of Identity Protection: You University of Houston News (07/30/07) Holdsworth, Ann
19-08-2007
Researchers Set to Spark Up New More Secure Network, Routers, Switches Network World (07/31/07)
19-08-2007
The High-Tech Future for the Army CNet (08/02/07) Skillings, Jonathan
19-08-2007
Action Plan to Beat Cybercrime Information Today (08/07) Vol. 24, No. 7, P. 24; Ashling, Jim
19-08-2007
Satellite Multimedia for Mobile Phones European Space Agency (07/26/07)
19-08-2007
SKorea Draws Up Code of Ethics -- For Robots ABCmoney.co.uk (08/07/07)
19-08-2007
A Little Privacy, Please Scientific American (07/07) Vol. 297, No. 1, P. 92; Walter, Chip
19-08-2007
Worldwide Malware Study Set for Launch Dark Reading (08/02/07) Wilson, Tim
19-08-2007
Prototype Software Tools Plugs Security Leaks LinuxElectrons (07/31/07) Tommy
19-08-2007
New Technology Has Dramatic Chip-Cooling Potential for Future Computers Purdue University News (08/13/07) Venere, Emil
19-08-2007
Beyond Batteries: Storing Power in a Sheet of Paper Rensselaer News (08/13/07) Mullaney, Michael
19-08-2007
Putting Electronics in a Spin BBC News (08/08/07) Fildes, Jonathan
19-08-2007
Local Teen Works to Advance Encryption Technology Henry Herald (08/13/07) Jackson, Johnny
19-08-2007
Computing Breakthrough Could Elevate Security to Unprecedented Levels University of Michigan News Service (08/16/07) Rabuck, Carol; Moore, Nicole
19-08-2007
The Grill: MIT Professor Hal Abelson on the Hot Seat Computerworld (08/06/07) Vol. 41, No. 32, P. 23; Anthes, Gary
19-08-2007
How Safe is ‘Social Networking’?
19-08-2007
ENISA and ITU launching new portal: for the 1st time giving Europe one, single access point for IT security standards
19-06-2007
Watching Virus Behavior Could Keep PCs Healthy New Scientist (06/15/07) Simonite, Tom
19-06-2007
Army, Air Force Seek to Go on Offesive in Cyber War GovExec.com (06/13/07) Brewin, Bob
19-06-2007
FBI: Operation Bot Roast Finds Over 1 Million Botnet Victims Network World (06/13/07) Cooney, Michael
19-06-2007
Denial-of-Service Attacks: Street Crime on the Web New Scientist (06/06/07) Vol. 194, No. 2607, P. 30; Giles, Jim
15-06-2007
New factoring record: 307 digits (1023 bits)
06-06-2007
China Prepares for First Strike in Electronic War eWeek (05/30/07) Vaas, Lisa
06-06-2007
Read ID, Real Debate Washington Technology (05/28/07) Vol. 22, No. 9, P. 24; Lipowicz, Alice
06-06-2007
Survey and Analysis of EU ICT Security Industry and Market for Products and Services
30-05-2007
After Computer Siege in Estonia, War Fears Turn to Cyberspace After Computer Siege in Estonia, War Fears Turn to Cyberspace
30-05-2007
Computer Scientists Set on Winning the Computer Virus 'Cold War' University of Wisconsin-Madison (05/24/07)
30-05-2007
Researcher: RSA 1024-Bit Encryption Not Enough IDG News Service (05/23/07) Kirk, Jeremy
30-05-2007
Eyeing Unnoticed Security Researchers SearchSecurity.com (05/23/07) Fisher, Dennis
30-05-2007
Noise Keeps Spooks Out of the Loop New Scientist (05/23/07) Palmer, Jason D.
25-05-2007
Phishers Can Use Social Web Sites as Bait to Net Victims: Informatics Study Indiana University (05/24/07)
25-05-2007
Can Cyborg Moths Bring Down Terrorists? Times Online (UK) (05/24/07) Bebber, David
25-05-2007
Computer Viruses Invade SSU Class--on Purpose Press Democrat (Santa Rosa, Calif.) (05/22/07) Halverson, Nathan
25-05-2007
Globalization Has Made Software Development a National Security Issue Computerworld Australia (05/23/07) Rossi, Sandra
23-05-2007
Cyber Assaults on Estonia Typify a New Battle Tactic Washington Post (05/19/07) P. A1; Finn, Peter
23-05-2007
New Software Can Identify You from Your Online Habits New Scientist (05/16/07) Marks, Paul
23-05-2007
DNSSec Too Costly, Difficult to Use, IGP Hears Washington Internet Daily (05/18/07) Vol. 8, No. 96, Piper, Greg
23-05-2007
Microsoft Man Seeks to Re-Engineer the Web Inquirer (UK) (05/16/07) Grossman, Wendy M.
21-05-2007
Hundreds Click on 'Click Here to Get Infected' Ad - By Lisa Vaas; eweek.com May18, 2007
20-05-2007
ACM Group Honors Research Team for Rare Finding in Computer Security AScribe Newswire (05/16/07)
20-05-2007
Cyber-War--the Way of the Future? Times Online (UK) (05/17/07) Richards, Jonathan
20-05-2007
Rise of the Machines Belfast Telegraph (05/16/07) Doherty, Gemma
20-05-2007
Wary of Everyware Chronicle of Higher Education (05/18/07) Vol. 53, No. 37, P. A26; Foster, Andrea L.
17-05-2007
Using 'Offensive Technologies' to Secure Networks Network World (05/14/07) Brown, Bob
15-05-2007
Java Security Traps Getting Worse eWeek (05/09/07) Vaas, Lisa
15-05-2007
Cracks in the Air Government Computer News (05/07/07) Vol. 26, No. 10, Jackson, William
15-05-2007
Google Searches Web's Dark Side BBC News (05/11/07)
08-05-2007
Putting Coders' Security Chops to the Test Application Development Trends (05/02/07) Waters, John K.
08-05-2007
European Institute of Technology Moves Another Step Closer to Reality Ars Technica (05/03/07) Hruska, Joel
08-05-2007
Web Browsers Are New Frontline in Internet War New Scientist (05/05/07) Vol. 194, No. 2602, P. 28; Hecht, Jeff
08-05-2007
Document Shell-Code Attacks on the Rise InfoWorld (05/02/07) Hines, Matt
06-05-2007
Pervasive Personal Computing in an Internet Suspend/Resume System Internet Computing (04/07) Vol. 11, No. 2, P. 16; Satyanarayanan, Mahadev; Gilbert, Benjamin; Toups, Matt
06-05-2007
Researchers: Health Sensors Open New Doors for Hackers ASU Insight (04/30/07) Evans, Deanna
06-05-2007
Respectful Cameras Technology Review (05/02/07) Borrell, Brendan
19-03-2007
Researchers Track Down Plague of Fake Web Sites New York Times (03/19/07) P. C4; Markoff, John
19-03-2007
A Peek Into the Future CNet (03/19/07) Ogg, Erica
17-03-2007
TheOnionRouter/SummerOfCode - Privacy & Anonymity Student Project
16-03-2007
The E-voting Question: To Open or Not to Open? National Journal's Technology Daily (03/15/07) Martinez, Michael
16-03-2007
Exabytes for Defense Military Information Technology (03/08/07) Vol. 11, No. 2, Gerber, Cheryl
13-03-2007
Last Month's Root-Server Attack Revisited Register (UK) (03/09/07) Goodin, Dan
10-03-2007
Is E-Government Ready for Prime Time? Internet Computing (04/07) Vol. 11, No. 2, P. 80; Ruth, Stephen; Doh, Soogwan
08-03-2007
Enhanced information security in software and services. What role for government, security providers and users? Viviane Reding
07-03-2007
Software Vulnerability Index Making Progress
07-03-2007
Researchers Peel the Onion Router IDG News Service (03/02/07) Kirk, Jeremy
07-03-2007
Foolproof Quantum Cryptography
13-02-2007
Open vs. Closed ACM Queue (02/07) Vol. 5, No. 1, Ford, Richard
29-06-2006
Analysis Finds e-Voting Machines Vulnerable USA Today (06/27/06) P. 14A; Stone, Andrea
27-06-2006
Keeping the Trust While Under Attack: What State CIOs Need to Know About Evolving IT Threats
27-06-2006
The 2006 World Cup: A Security Nightmare?
26-05-2006
Your Thoughts Are Your Password - Wired News (04/27/06) Sandhana, Lakshmi
26-05-2006
Should Owners of Web Sites Be Anonymous? - Wall Street Journal (04/27/06) P. B1; Bulkeley, William M.
26-05-2006
Google's China Problem (And China's Google Problem) - New York Times Magazine (04/23/06) P. 64; Thompson, Clive
26-05-2006
Password Security Is Her Game - California State University, Long Beach (05/06) Vol. 58, No. 5,Manly, Richard
26-05-2006
USC Hacker Case Pivotal to Future Web Security - InformationWeek (05/09/06) Greenemeier, Larry
26-05-2006
DNS Security: Most Vulnerable and Valuable Assets - IT Observer (05/08/06)
26-05-2006
Defining Trust - SC Magazine (04/06) P. 26; Kaplan, Dan
23-05-2006
Estonia and Electronic Voting
23-05-2006
Is Google's blog-creation tool and hosting service secure?
23-05-2006
Data protection and European airlines passengers visiting to Canada
23-05-2006
'Mashup' Websites Are a Hacker's Dream Come True - New Scientist (05/13/06) Vol. 190, No. 2551, P. 28; Marks, Paul
23-05-2006
Cyber Threats to U.S. Business Grow More Dangerous Reuters (05/14/06) Rothstein, Joel


University of the Aegean | Greece

School of Engineering | Information and Communication Systems Engineering

Karlovassi, Samos, 83200, Greece

Email : info-sec-lab@aegean.gr | Fax : +30-22730-82009

ICSD 2008-2017