A Brief History of Cyber Attacks and the Olympics
The first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting…
DetailsThe first time I was exposed to the IT security concerns of the Olympics was in 2003 when a delegation from China visited the US to garner advice on protecting…
DetailsAs various pundits have reeled off their security advice for 2014 many have listed the growing threat of denial of service (DoS) attacks as something to look out for. They…
DetailsThese days every company conducting business on the Internet must be vigilant to stave off the endless onslaught of viruses and other malware. Attackers who use software programs to make…
DetailsThe primary developer behind banking Trojan SpyEye pleaded guilty January 28 to committing wire and bank fraud, according to a statement from the
I have a pet peeve. It’s the use of the word “folks,” which has been popularized by the current administration. I know it makes the President appear avuncular and, well, folksy.…
DetailsUnder new Department of Justice rules, technology and telecommunications companies are now allowed to provide more information about government requests for customer data. However, they will still be restricted from disclosing…
DetailsGlobal security company and defense contractor Lockheed Martin Corp and data storage equipment maker EMC Corp, RSA’s parent company, have announced that they will jointly invest in technology projects including…
DetailsLate Monday three separate media outlets reported on how the NSA snoops on data transmitted from cell phone apps. The New York Times, The Guardian, and ProPublica each covered how…
DetailsThe CEO of Bitcoin New York-based exchange BitInstant, Charlie Shrem, was arrested and charged with money laundering. In the federal criminal complaint, the Southern District of New York charges that…
DetailsIn an interview with the BBC well know security expert Bruce Schneier declaimed that intelligence agency attacks on Internet infrastructure have broken trust. “The fact that it has been subverted in ways…
Details