The New York Times, BBC, The Hill, Newsweek, AOL, MSN, and several other top-tier domains had their ad networks hijacked over the weekend by criminals using the Angler Exploit Kit to deliver Ransomware. Read More ▶ |
|
| White Paper: Lockheed Martin Industrial Defender Inc A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! Read More ▶ | The Defense Advanced Research Projects Agency) says it needs input from as many technical people, in as wide a range of specialties, as possible. Read More ▶ |
| Typing .om instead of .com in a URL could lead to malware for Mac and Windows PCs. Read More ▶ |
| A careful count of the number of IT security vendors around the world reveals unprecedented growth. Read More ▶ |
| | Applications, as well as the companies that develop them, will come and go. But once the spark has gone, what happens to the users? In at least one instance, they'll have their account information exposed to the public by a seemingly abandoned database. Read More ▶ |
| In an unusual confluence of events, all three branches of the federal government are weighing changes that would affect when and how personal data is accessed. Read More ▶ |
| Video/Webcast: Lockheed Martin Industrial Defender Inc Click here to listen to SANS ICS experts Michael Assante, and Robert M. Lee, along with Lockheed Martin Director of Commercial Cyber Solutions, Richard Mahler share Insight into APTs targeting ICS and critical infrastructure. Read More ▶ | Editor's Picks |
|
|
|