The negative impact on GDP of state-sponsored malware like Stuxnet and Flame
The slow drip of revelations about Flame have kept this piece of malware in the news for more than two weeks so it is worth reminding people that most antivirus programs now protect against Flame (ESET...
View ArticleSBN Sponsor Post
Get the very latest news all in one place. Become a Facebook fan of RSA Conference. http://on.fb.me/p1hr8l
View ArticleQuestions from alert readers about the Fujitsu discrete log calculation
I've received lots of questions atbout whether I was talking about the comments on the Internet on the recent announcement by a team from the Japanese National Institute of Information and...
View ArticleDo the Mac App Store and Gatekeeper provide sufficient protection?
Apple is pushing its users more and more to download apps from the Mac App Store. But what happens if the software on the Mac App Store is less secure than non-App Store versions?
View ArticleWindows 8 Harder For Malware?
I would like to believe that this is the case. According to researcher Chris Valasek, Windows 8 will be far better at protecting against malware than it’s predecessors. Like any arms race I guess we...
View ArticleThe Many Flavors of AppSec – Recipe 2
document.write(unescape("%3Ciframe src='http://www.facebook.com/plugins/like.php?href=" + document.URL +...
View ArticleWAFs in the SDLC
Great piece from SearchSecurity: The application security challenge has become so difficult to address through development, Krikken said, that he instead encouraged enterprises to consider an...
View ArticleAutomating the Change Workflow for Blue Coat Secure Web Gateways
Network complexity is a killer. Managing different network and security devices, from different vendors, distributed across multiple geographical locations isn't easy and can pose operational and...
View ArticleA spotlight on JSA, the amazing hybrid security analysis for JavaScript
By now you have probably heard about JSA. Introduced in AppScan Standard 8.0 in Oct '10, and now included in AppScan Enterprise 8.6, JSA is a component that does static analysis of JavaScript to detect...
View ArticleFiguring Out the True Size of the LinkedIn Breach
Great column by Imperva's Tal Be'ery explaining why the LinkedIn breach exceeds 6.5M users. They fun bits: In the RockYou password breach , which now serves as the gold standard for passwords study, it...
View ArticleAnd Then There Were Four … NSA Cyber Offense Schools
A while ago, we talked about the new 22 NSA Centers of Academic Excellence (CAE) schools with programs in Information Assurance Education (IAE) and Research (R). Just recently it looks like the NSA...
View ArticleMineralTree Raises $6.3 Million To Accelerate Growth
Fidelity Growth Partners India leads financing round
View ArticleGemalto Launches Protiva Defender Suite, an End-To-End Identity And Access...
Provicta Defender Suite addresses increasing industry regulations mandating strong digital identity verification
View Article3 Reasons Flame is a Game Changer
Back in the late ’90s, the president of a prominent U.S. anti-virus company was approached by a delegation from India. Their request? Weapons-grade malware. In the same month, he was also approached by...
View ArticleSophos CEO targeted by email scammer
Sometimes email scams can contain facts that make them surprisingly believable. As Sophos CEO Steve Munford recently discovered. The question is - was he specifically targeted, or was it just...
View ArticleDIRNSA, Cloud, National Security
Interesting reportage, of Director Alexander's, GEN, USAA, Chief CSS, concerted opinion, targeting cloud security and government. ⨔
View ArticleHelp Keep PayPal Safe – The Bug Bounty Way!
In an effort to keep PayPal the safe and secure online payment company, we are pleased to announce the launch of a bug bounty program! Our official announcement is here and the the official details of...
View ArticleVirus Purloins Blueprints
Industrial espionage or, as I tend to refer to it, the logical progression of script kiddies who managed to not get caught in the 90′s. This time hackers were going after AutoCAD as their attack...
View ArticleCybercriminals Are Getting Better And Faster
Five years ago, Google started a “Safe Browsing” initiative to track down malicious content across the Web. On Tuesday, the company shared some of the insights it gleaned during the cleanup job. It...
View ArticleNitrozac and Snaggy: Detection
via the comic genius of Nitrozac and Snaggy at The Joy of Tech™
View Article