Evidence Appearing That NSA Knew About Heartbleed
While Bruce Schneier may have been jumping to conclusions when he said: “At this point, the probability is close to one that every target has had its private keys extracted…
DetailsWhile Bruce Schneier may have been jumping to conclusions when he said: “At this point, the probability is close to one that every target has had its private keys extracted…
DetailsAfter presenting this week at InfoSecWorld 2014 on Why Risk Management Fails, I was asked by a frustrated risk management professional how to build an IT security program. The days…
DetailsIn the days since the Heartbleed Bug, a vulnerability in OpenSSL heart beat function, was exposed we have begun to see signs of the Internet bleeding out. Bruce Schneier ranks…
DetailsConsidering that SSL protocols, including OpenSSL, are used anywhere machines have to communicate securely with each other, Heartbleed isn’t just a problem for Web servers. The vulnerability is present in…
DetailsThe announcement yesterday of a widely deployed vulnerability in OpenSSL, the Heartbleed Bug, is set to shake up the security industry. According to the discoverers at Codenomicon and Google, all Apache…
DetailsCyber-attackers are withdrawing large amounts of money using stolen debit card information, often in amounts exceeding ATM limits or even the amount the victim has in the account, the Federal…
DetailsThe US Federal Financial Institution Examination Council’s (FFIEC) recent guidance on distributed denial of service (DDoS) attacks, provides financial institutions with at least six-steps as part of their responsibility to mitigate…
DetailsApple Inc and Intertrust Technologies Corp, a provider of trusted computing technologies, have agreed to settle a year-old patent infringement case, according to court records. Terms of the settlement were…
DetailsThis series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
DetailsThe emerging field of cyber policy is attracting government, academic, and technology experts. Here is a list of cyber policy experts from around the world who are well worth following…
Details