The ABCs of Hacking a Voting Machine A hacker who successfully infiltrated a voting machine at last year's DEF CON will demonstrate at Black Hat USA how he did it, as well as what he later found stored on other decommissioned WinVote machines.
US Intel Officials Share Their National Cybersecurity Concerns Leaders in the security sector discuss the most pressing cyberthreats threatening the United States and what can be done to mitigate them.
New Report Shows Pen Testers Usually Win Pen testers are successful most of the time, and it's not all about stolen credentials, according to a new report based on hundreds of tests.
US-CERT Warns of ERP Application Hacking ERP applications such as Oracle and SAP's are open to exploit and under attack, according to a new report referenced in a US-CERT warning.
Threat Hunting: Rethinking 'Needle in a Haystack' Security Defenses In cyber, needles (that is, threats) can disappear quickly, for a variety of reasons, and long often after hackers have completed what they came to do.
Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.
London Calling with New Strategies to Stop Ransomware The new London Protocol from the Certificate Authority Security Council/Browser Forum aims to minimize the possibility of phishing activity on high-value identity websites.