Announcing a new milestone on Monday, Google says that they've paid out nearly $2M in bounties to security researchers who have disclosed bugs in Chromium. To celebrate, the search giant is boosting their reward scheme, offering even more money for the discovery of future bugs.
Steve Ragan |
13 Aug |
Read more
Code on the Central Tibetan Administration website targets Chinese-speaking visitors and installs a backdoor on their systems
Steve Ragan |
12 Aug |
Read more
Patch release addresses flaw linked to several compromises, as well as malware distribution and phishing campaigns, on other sites
Steve Ragan |
12 Aug |
Read more
On Wednesday, Arbor Networks released a report on a massive password bruteforcing attack campaign. CSO followed the trail left by the attackers and independently confirmed many of Arbor's findings. However, the campaign is ongoing, and the attackers look to be covering their tracks.
Steve Ragan |
09 Aug |
Read more
According to a new study from Price Waterhouse Coopers says that many companies are not leveraging social media when it comes to business continuity management, but documentation processes are being coming more pragmatic, and vendor resiliency is starting to take hold.
Steve Ragan |
08 Aug |
Read more
On Tuesday, President Obama's cybersecurity coordinator, Michael Daniel, blogged about a handful of incentives being considered, as the Department's of Homeland Security, Treasury, and Commerce, work with the public and private sectors to establish a cybersecurity framework due in February of 2014.
Steve Ragan |
07 Aug |
Read more
Internet watchdog group says legitimate business web sites are unwittingly being used as a conduit to relay child porn images
Steve Ragan |
07 Aug |
Read more
Technology from Neohapsis drastically drops the time needed for a Man-in-the-Middle attack using IPv6
Steve Ragan |
06 Aug |
Read more
Sin City was filled with plenty of people last week, and thousands of them were hackers. That's understandable, considering that Las Vegas hosted the Black Hat security conference, the B-Sides security conference, and DEF CON 21. Most of the week focused on talks, new products, creative uses of code (for defense and offence), but there was another side as well; people, and the information they possess.
Steve Ragan |
05 Aug |
Read more
IT professionals, security experts, and researchers have traveled to Sin City this week, in order to attend the annual Black Hat security conference. While many of the presentations and demos at Black Hat will focus on trends and the latest technological advances for those who attack the network and those who defend it, there isn't much on the topic of incident response.
Steve Ragan |
02 Aug |
Read more
General Keith Alexander, Director of the National Security Agency, kept a cool head as he was heckled by attendees during his keynote address at the Black Hat security conference in Las Vegas on Wednesday
Steve Ragan |
31 Jul |
Read more
The Syrian Electronic Army has social engineered email accounts maintained by White House Staffers, in addition to the Twitter feed maintained by Thompson Reuters
Steve Ragan |
30 Jul |
Read more
Shock and grief in the security community after word spreads that famed embedded device hacker Barnaby Jack has died
Steve Ragan |
26 Jul |
Read more
Next week, security professionals and hackers will descend on Las Vegas for the Black Hat security conference and Def Con 21. Security vendors and news organizations often talk about precautions and offer security advice this time of year, but Chris Hadnagy, from Social-Engineer Inc., has some additional thoughts, which focus on the human side of security.
Steve Ragan |
25 Jul |
Read more
Last week, news broke that Samsung was pushing into the federal space and is close to inking a deal with the FBI and the U.S. Navy. While that story hinges on the shift from BlackBerry to Android and Apple in the secure mobile space, it also singles out the fact that BYOD isn't a buzzword -- it's a reality within IT operations.
Steve Ragan |
25 Jul |
Read more