Your search for peer-to-peer returned 2057 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Slideshow Top 5 legal developments in 2013

Top 5 legal developments in 2013

From the introduction of "Aaron's Law" to laws being passed to curb the threat of cyber espionage, these are the notable legal developments that caught our attention this year.

News Pwnium 4 prizes aimed at Chrome OS hacks

Pwnium 4 prizes aimed at Chrome OS hacks

At this year's contest in Vancouver, Google is giving researchers a chance to win up to $150,000 for findings serious flaws in its operating system.

News Critical update makes P2P Zeus trojan even tougher to remove

Critical update makes P2P Zeus trojan even tougher to remove

An update to the P2P Zeus banking trojan results in the installation of a rootkit driver that makes deleting the malware even tougher.

Brief

Hackers steal more than a million dollars worth of Bitcoin

Inputs.io was left unable to pay an undisclosed number of user balances after the free Bitcoin eWallet service was hacked on Thursday and relieved of 4,100 Bitcoin. That translates to about $1.1 million.

Blog Post A new approach to mobile data security

A new approach to mobile data security

Countries have different regulations on how mobile data can be used, stored and transferred. So what can mobile content and service providers do to solve the problem?

Slideshow Weekend news review: March 24-28

Weekend news review: March 24-28

Another week in information security brings us major news items that involve more Snowden leaks, the president proposing new legislation on government surveillance, and interesting research by experts that indicates how smart TVs don't have smart security.

Brief

Companies settle over false data security framework compliance claims

The Federal Trade Commission has charged 12 companies with falsely claiming to comply with the U.S.-EU Safe Harbor Framework.

News Target did not respond to FireEye security alerts prior to breach, according to report

Target did not respond to FireEye security alerts prior to breach, according to report

Prior to its massive breach, Target seems not to have responded to multiple alerts from security company FireEye involving suspicious activity on the retailer's network.

News

Financial malware 'i2Ninja' being sold on Russian cyber crime forum

Although it has yet to be discovered in the wild, researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime forum.

Blog Post Time to rethink network security

Time to rethink network security

The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.

News

APT12 group latches to G20 Summit buzz to infiltrate organizations

APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.

Brief

Gameover trojan uses rootkit to remain stealthy, tougher to remove

Researchers have discovered a Gameover variant of the Zeus trojan that has been modified to include the Necurs rootkit, which makes the malware tougher to detect and remove by protecting files on the disk and memory.

Opinion How to avoid the Spamhaus' blacklist to maintain email deliverability

How to avoid the Spamhaus' blacklist to maintain email deliverability

Spamhaus seems to be shrouded in mystery, and rightly so. There is a lot of misinformation out there regarding the service. But, there's one thing I'd like to clear up. Hint: It's all about the approval.

News

$20m to fund cyber strategies

Defence Minister Peter MacKay has committed $20 million to fund projects aimed at making Canada safer from cyber attacks.

Brief

NSA ordered to halt plans to destroy phone data records

A federal judge ordered the National Security Agency (NSA) to stop destroying millions of phone records until at least March 19.

Brief

Alex Stamos to become Yahoo CISO, according to report

Citing "sources familiar with the matter," independent technology news site Re/code is reported on Friday that Yahoo has tapped Alex Stamos to become its new CISO.

Feature From private sector to government

From private sector to government

Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.

Slideshow Weekend news review: March 31 - April 4

Weekend news review: March 31 - April 4

This week's news review features stories on the recent class-action suit filed against Target and Trustwave, a study on Advanced Evasion Techniques, and news on millions of home routers that enable DNS amplification DDoS attacks. For more deeper look at these news bits, click here to visit our...

News

Ontario moving to electronic voting

The Province of Ontario's 8.5 million voters may have the option of casting their ballot online in the coming decade, making it the largest jurisdiction in the world to introduce voting by internet.

Opinion CSOs should report to the CEO

CSOs should report to the CEO

CSOs need to be able to function at the highest levels of an organization while not being tethered to a specific department or operational function.

Page 1 of 103

Sign up to our newsletters

POLL