Cisco Snorts up Sourcefire in $2.7bn acquisition
Cisco announces they will acquire Sourcefire, the company best known for the open source IDS tool Snort
Steve Ragan | 24 Jul | Read more
Cisco announces they will acquire Sourcefire, the company best known for the open source IDS tool Snort
Steve Ragan | 24 Jul | Read more
French webhost, OVH, is urging customers to change their passwords after attackers were able to compromise the company's European customer database and gain access to an installation server in Canada.
Steve Ragan | 23 Jul | Read more
Ibrahim Baliç says he was just searching for bugs and now Apple's Developer Center portal is down
Steve Ragan | 23 Jul | Read more
Samsung is close to inking a deal with the FBI and the U.S. Navy for mobile devices --placing a foot into the door that was previously blocked by BlackBerry (formerly Research in Motion).
Steve Ragan | 19 Jul | Read more
Syrian Electronic Army claims to have taken more than 500GB in data from Truecaller, a company that operates a phone directory service with more than 20 million users worldwide
Steve Ragan | 19 Jul | Read more
Researchers at Sucuri, a firm focused on website security awareness and attack recovery, have discovered attackers using a known, but a rather uncommon method of maintaining access to an already compromised server: They're hiding backdoors inside the headers of legitimate image files.
Steve Ragan | 18 Jul | Read more
Bug bounty programs are rather popular these days. Companies such as Google, Microsoft, and Mozilla pay respectable amounts of money to researchers who disclose vulnerabilities to them. While the argument can be made that some vulnerabilities are worth far more on the open market than the bounty paid, most vendors respect this and offer as much as they can, but do so knowing they can't compete with many organizations.
Steve Ragan | 18 Jul | Read more
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network support operations are still the top target when it comes to breaching corporate security. The reason is that help desk operators are being too helpful, which results in attackers gaining access simply by asking.
Steve Ragan | 17 Jul | Read more
A new report from the Research Department of the International Organization of Securities Commissions (IOSCO) and the World Federation of Exchanges (WFE) Office says that cybercrime within the securities markets can be considered a potentially systemic risk.
Steve Ragan | 17 Jul | Read more
In the first report of its kind, California's Attorney General, Kamala D. Harris, had revealed that 2.5 million people -- roughly 6.5 percent of the state's population -- were exposed by data breaches in 2012.
Steve Ragan | 17 Jul | Read more
South Korean officials say cyberattacks, including DDoS attacks and defacement of government web sites, were the work of its neighbor to the north
Steve Ragan | 17 Jul | Read more
Malware targeting OS X is using a technique called Right-to-Left Override in order to spoof its malicious intent
Steve Ragan | 16 Jul | Read more
Passwords are a thing of the past -- and they need to go, according to a group of Silicon Valley-based tech companies who are part of a public advocacy campaign called Petition Against Passwords.
Steve Ragan | 16 Jul | Read more
Sony, entertainment giant and the company most noted in the security world as the source of a massive breach that impacted millions of accounts in 2011, has said they will abandon the appeal that was filed with the Information Commissioner's Office (ICO) in the U.K., due to security concerns. The move means they will pay the £250,000 fine ($377,400) levied against the company earlier this year and walk away from the table.
Steve Ragan | 15 Jul | Read more