How Guccifer 2.0 Got 'Punk'd' by a Security Researcher Security expert and former Illinois state senate candidate John Bambenek details his two months of online interaction with the 'unsupervised cutout' who shared with him more stolen DCCC documents.
Intel SGX Can Be Used to Hide, Execute Malware The microprocessor giant's Software Guard Extensions security feature can be abused to implement virtually undetectable malware, Graz University researchers say.
Researchers Defeat Android OEMs' Security Mitigations At Black Hat Asia, two security experts will bypass security improvements added to Android by equipment manufacturers.
Group-IB Helps Suspend Ukrainian DDoS Attack Group This case marks the first successful prosecution of cybercriminals in Ukraine, the organization reports.
Privilege Abuse Attacks: 4 Common Scenarios It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.
Why Security-Driven Companies Are More Successful Software Security Masters are better at handling application development security and show much higher growth than their peers. Here's how to become one.
Memcached DDoS Attack: Kill Switch, New Details Disclosed Corero shares a kill switch for the Memcached vulnerability and reports the flaw is more extensive than originally believed.