Are you an IT security leader - really?
An astonishing number of survey respondents believe they are IT security leaders. But what does it really take to be a leader, and how does your organization stack up? A surprisingly high
An astonishing number of survey respondents believe they are IT security leaders. But what does it really take to be a leader, and how does your organization stack up? A surprisingly high
The hacker group Anonymous, which is less a coherent group of people working together toward a common cause than a random medley of hackers out to prank and disrupt the online world, has been busy these days. Multiple hacks on Bay Area Rapid Transit websites in response to BART's shutdown of the railway's underground cellular system have captured the attention of activists and technophiles alike.
As reported in FierceFinanceIT, 2011 has seen major financial and commercial companies victimized by online breaches. In an effort to beef up security, many of these companies are now turning to certified professional hackers to test and enhance security systems.
The blogosphere is abuzz over the latest Black Hat presentation exposing the security holes of Apple's Mac OS X. The upshot is that Microsoft Windows, in comparison, does a better job of protecting its users, especially against network protocol attacks.
THE APPARENT LEADER of the Lulzsec hackers has been tweeting from the Defcon security conference and goading law enforcement officers in attendance.
WHY are federal agents hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with them on Friday. They smiled, shook hands, handed out business cards, spoke on a panel called
The Defense Advanced Research Projects Agency on Thursday launched Cyber Fast Track, an effort to fund innovative cybersecurity efforts by groups and people who don't usually do work for the government, including hobbyists, boutique security labs, and other small groups of hackers, DARPA project manager Peiter "Mudge" Zatko announced at Black Hat, a UBM TechWeb event, in Las Vegas.
The advanced persistent threat (APT) attackers behind the newly revealed Operation Shady RAT also deployed a tool called HTran that helps disguise their location.
More arrests could be made as federal authorities take aim at a gang of computer hackers known as Anonymous. So far, 16 arrests have been made which included a 20-year-old UNLV student.
Google's ChromeOS is a browser-based cloud powered operating system that holds the potential to be more secure than other traditional hard disk powered operating systems. According to research from security firm Whitehat, ChromeOS has its strengths, but it also has a few weaknesses too.
For months we've been reading about hacker groups like Lulz Security who reportedly have no agenda other than to create mayhem and laugh-snort at their own clever online exploits.
The copyright litigation factory known as Righthaven has been exposed as making what the Electronic Frontier Foundation said Monday were bogus claims to judges that it
In the Cabinet War Rooms in Whitehall, London - the bunker where Winston Churchill all but ran the UK's second world war operations - cybersecurity specialists summoned by antivirus firm Symantec today explained their views on defeating computer crime ahead of this week's Infosecurity conference in London.
Its been almost 3 weeks now since Blackhat Europe was held in Barcelona, Spain
The first-ever social engineering contest at DefCon in Las Vegas last year went way too well: each contestant was able to successfully social-engineer some piece of information, or "flag," out of their targeted company.
Although Chrome wasn't attacked directly at the contest, Google has released an update for the Windows, Linux and Mac OS X versions of its browser. The update closes a hole in WebKit that was originally exploited in Blackberry devices
The second day of the Pwn2Own competition, organised by the Zero Day Initiative (ZDI) team at security researchers TippingPoint, was devoted to iPhone and BlackBerry. Charlie Miller exploited a vulnerability in the mobile version of the Safari web browser on iOS 4.2.1 to delete the address book when a manipulative website was visited.
When the Pwn2Own contest began in 2007, it was dismissed by some in the industry as nothing more than a publicity stunt meant to inflate the egos of researchers while embarrassing software vendors. But as the fifth edition of the hacker challenge gets underway at the CanSecWest conference here this week, it has evolved into a display of some of the few things that are actually good and right with the security community.
Google's $20,000 was as safe at Pwn2Own Wednesday as if it had been in the bank. The search giant had promised to pay $20,000 to the first researcher who broke into Chrome on the hacking contest's opening day.