The annual Cyber Boot Camp in San Diego aims to develop the skills, mindset, and moral code required defend networks against criminal abuse. Here are just seven of the many lessons students learned at this year's event.
A key update to the PCI standard has been issued by the PCI standards body, the Payment Card Industry Security Standards Council (PCI SSC).
We Live Security looks at six of the biggest online gaming hacks to date – From Xbox Live and PSN, to Big Fish Games and Steam.
A series of more than 160 data breaches have struck local authorities in Norfolk, Suffolk and Cambridgeshire over the past year, according to new reports.
An entire US department program is to be suspended in order to fix vulnerabilities discovered during a security audit.
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.
Getting started on designing a network is a task of formidable proportions, but all the more so if you are looking to build a secure network.
Internet name authority ICANN has unsettled privacy advocates after a new working group document flagged changes to the way domain proxy services can operate.
Cisco security engineers have disclosed that there is a single default ‘maintenance’ SSH key hardcoded into several families of Cisco security appliances.
There's a lot more to phone scams than tech support, giving rise to an escalating number of complaints. Here's what two recent reports tell us.
Recent high-profile data breaches have illustrated criminals’ insatiable appetite for data and financial reward. Here's some information on what to do after an attack.
Apple will reportedly introduce a new privacy update for the iPhone that will prevent installed iOS apps from seeing which other apps have been downloaded to the device.
A serious flaw has been discovered in the Spiceworks application, which creates an admin account for anyone logging in using their Facebook or LinkedIn details.
A hacker has published an extensive list of Adobe Reader and Windows vulnerabilities based on his research into a relatively obscure area of font management.
An ingenious team of Israeli security researchers at Tel Aviv University have discovered a way to steal secret encryption keys using a gadget so small it can be hidden inside some pita bread.
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?
Google has updated the Chrome browser to version 43.0.2357.130 for Windows, Mac, and Linux.
Hackers are being blamed for an attack which grounded 1,400 passengers set to fly on Polish airline LOT.
LinkedIn will continue a bug bounty program that pays out to a closed group of security researchers, claiming that an invite-only approach reduces the number of irrelevant reports.
Popular meme site Reddit has announced that it will soon encrypt all traffic with HTTPS by default.