WikiLeaks Vault 7: CIA’s stealthy Angelfire Windows malware
Angelfire is the twenty second malware WikiLeaks has revealed since March.
Angelfire is the twenty second malware WikiLeaks has revealed since March.
In a sign of slowly maturing managerial attitudes towards security, a new survey found that CSOs are feeling less pressure from management to fast-track IT projects and new technology rollouts. They may also be finding that detecting insider threats is easier than they think – although many are still running periodic vulnerability assessments that may be a recipe for disaster.
David Braue | 18 Apr | Read more
People power took an interesting turn as a crowdfunding effort raised $US250,000 ($A326,000) to purchase the browsing histories of US politicians – who recently voted in legislation to allow ISPs to aggregate and resell the browsing histories of their customers. There were also demands by US lawmakers to know how many US residents the National Security Agency is currently surveilling.
David Braue | 10 Apr | Read more
Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
Lucian Constantin | 10 Mar | Read more
Many controls we've used for years can't effectively deal with today's threats. We must extend some and add others to prevent, detect, and respond to emerging threats to our business operations.
I cannot help but to think of some memes at times. The one that has gotten lodged there today is the late Robin Williams with a great big bushy beard screaming “What year is it?”. News came out today that, at long last, the White House has come to the conclusion that there is a need for a CISO.
Dave Lewis | 31 Mar | Read more
Following the breach of the CIA director's personal email account, the FBI has warned police to be wary of hacktivist threats and its chief advice is to enable two-factor authentication (2FA).
House Intelligence Committee Chairman Mike Rogers is skeptical that former NSA contractor Edward Snowden could have known to look for all the documents he leaked and been able to circumvent security checks on his own.
Kenneth Corbin | 03 Oct | Read more
Edward Snowden may not have acted alone, and may have had outside assistance, when he leaked information about the U.S. National Security Agency's data collection and surveillance programs earlier this year.
Grant Gross | 03 Oct | Read more
Intelligence agencies eye use of financial crime data to fight terrorism
John P. Mello Jr. | 15 Mar | Read more
Over the weekend, the hyperactive group of hackers who call themselves Lulzsec announced they are <a href="http://www.pcworld.com/article/231201/lulzsec_says_goodbye_with_new_data_dump.html?tk=rel_news">breaking up the band</a>, while also claiming that their "50-day cruise" had been planned all along.