Stepping Up Security for IoT
Check out this New York Times article how the internet of things will drive consumers to take even greater precautions with their technology. This article...
Sarvdap Spambot Checks IP Blacklists
Ionut Arghire wrote an interesting post about Sarvdap Spambot Checks IP Blacklists that I would like to share.
"The Sarvdap spambot was recently observed checking the...
HomeKit is where the dearth is – no one wants Apple’s IoT tech
Is anyone buying it – figuratively or literally?
It's been four months since Apple half-launched its smart-home/internet-of-things service through the introduction of a new app...
Battling the Botnet Armies
Marie Hattar wrote an interesting post about Battling the Botnet Armies that I would like to share.
"Botnet armies have become bigger, more active and more...
Dyre Authors Apparently Working on New Banking Trojan
Eduard Kovacs wrote an interesting post about Dyre Authors Apparently Working on New Banking Trojan that I would like to share.
"At least one of the...
Researchers Build Configuration Extractor for Locky Ransomware
Ionut Arghire wrote an interesting post about Researchers Build Configuration Extractor for Locky Ransomware that I would like to share.
"Researchers from Cisco Talos have created a new tool...
Breaking the OODA Loop!
Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share.
"The OODA loop is a well established concept often...
A Spell Check Equivalent for Building Security In
Jim Ivers wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share.
"I can honestly say that spell...
Want Better Security? Be a Pragmatist.
Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share.
"I’ve always considered myself a pragmatist. Perhaps not...
Using Apache Hadoop to Meet Cybersecurity Challenges
Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share.
"Apache Hadoop turned 10 this year.
What...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...