Latest News

News

Panther Creek senior arrested for hacking school, changing grades

In an oft-repeated tale, a senior at Panther Creek High School was arrested on felony and misdemeanor charges for hacking into a school computer and changing grades.

News

Energy sector execs see successful cyberattack as likely

A cyberattack on a company in the energy, utility, oil and gas sectors is fully capable of causing harm to the physical plant, according to a Tripwire survey of IT professionals working in these fields.

News

Private sector can't ignore threat intel

As IT security decision-makers wrestle with how to evaluate threat intelligence solutions, especially in light of the recent demise of intel provider Norse Corp., a new report highlighted the perils of ignoring threat intelligence.

News

Powell, Rice use of private email highlights government-wide security problem

The Office of the Inspector General (OIG) said Colin Powell and Condeleeza Rice both used private email for classified information and a heavily redacted email from John Kerry showed that he likewise used a private email account

News

Malware museum features a virtual rogues gallery of nefarious coding

The non-profit Internet Archive library today unveiled a virtual Malware Museum, which offers a look back at some of the hacking community's earliest attempts to infect computers.

Data Breach Blog

Unauthorized access leads to Neiman Marcus Group breach, 5,200 affected

Neiman Marcus Group (NMG) reported that someone gained unauthorized access to thousands of online customer accounts.

Missing drives contained PHI on 950K Centene customers

During an inventory of its IT assets, health insurer Centene discovered that six hard drives containing personal and health information on 950,000 customers had gone missing.

University of Virginia hit with Phishing scam, 1,400 affected

The University of Virginia (UVA) suffered a data breach that was initiated via a phishing scam that revealed the tax and banking data of some of the school's employees.

Featured News

Integrating mobile: Mobile security

Integrating mobile: Mobile security

From sales staff working the floor in large stores to corporate road warriors flitting from city to city, there is no debate about the degree to which mobile devices have increased productivity.

February issue now available

The Threat Hunter Blog

STIX Wrap-Up

STIX Wrap-Up

Well, after a bit of travel that slowed me down, we're ready to wrap up our introduction to STIX. We ended last time on a high level overview of the APT1 campaign as presented by Mandiant/FireEye. That top level looked a bit like Figure 1:

Opinions

Opinions Me and my job: Gina Chapman

Me and my job: Gina Chapman

Gina Chapman, senior director of security operations, Center for Internet Security

Opinions

Threat of the month: February 2016

Threat of the month: Man-in-the-middle attack

Opinions

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US