Spend a few days hanging around Black Hat and DEF CON, and you’ll see some creepy hacks. If you wanna lose a little sleep, dwell on the fact it’s much easier… Read more »
FBI CISO Patrick Reidy gave Black Hat attendees some advice on detecting insider threats inside their agencies or companies. Essentially, he said, there’s no Edward Snowden profile that should set off… Read more »
Sqrrl Enterprise, a commercial version of the National Security Agency’s Accumulo database technology, is now generally available. As one might expect, it’s all about security and analytics at a massive scale. Read more »
There’s much debate still to be had over the NSA’s recently uncovered data-collection practices, but some of the technologies underlying them are out in the open. Here’s what we know already. Read more »
Just when you thought spam was under control, a new breed of spammers is taking up new methods to infiltrate our inboxes, search results and social media feeds. Data science could… Read more »
What’s true in the rest of the world is true for security software, as well: more data means more intelligence. Thanks to the emergence of new techniques for storing, collecting and… Read more »
Hosting giant GoDaddy has completed its investigation of Monday’s outage and deemed it was not the result of a DDoS attack as originally rumored, but rather the result of network failures… Read more »
A team of Swiss researchers thinks it has created an algorithm capable of tracking almost anything — from computer viruses to terrorist attacks to epidemics — back to the source using… Read more »
These suggestions might seem like common sense, but the more we use cloud services, the more we put ourselves at risk of identity theft and other negative effects of cybercrime. Here… Read more »
For renowned computer hacker turned security consultant Kevin Mitnick, his online life is like one big playground game. “It’s like I’m the king of the mountain,” Mitnick says, “and everybody wants… Read more »