Cyber Security

8 Books Security Pros Should Read (Dark Reading)

Applied Cryptography is an overview of cryptography's many use cases, which go beyond encoding and decoding information. Author Bruce Schneier covers general classes of cryptograp... More

Hackers Advertising, Selling Phishing Kits Via YouTube with Secret Backdoor (IB Times)

Cybercrime, like any other enterprise is a business, albeit an illegal one. Apart from targeting individuals, businesses and governments, cybercriminals also cash in by creating, u... More

IPTV: Mass Piracy That’s Flying Largely Under The Radar (TorrentFreak)

Kodi and its third party 'pirate' addons have been getting an awful lot of press this year but there's a hidden side to streaming that receives much less attention. Enter the world... More

Weekend Vulnerability and Patch Report, Nov. 27, 2016 (Citadel Information Group)

Important Security Updates AVG Free Edition: AVG has released version 2016.131.7924 of its 32 bit Free Edition. Updates are available on AVG’s website. AVG Internet Secur... More

You’d Likely Give Up Sex for Cybersecurity, Poll Finds (CNET)

Could you become, as Jerry Seinfeld put it, "master of your domain" to save your web domains? In a classic "Seinfeld" episode, Jerry and his friends each bet a hundred bucks in... More

Retail Cybersecurity: Black Friday and Cyber Monday Are Upon Us (Security Intelligence)

In the U.S., the post-Thanksgiving shopping blitz of Black Friday often serves as a make-or-break event for many retailers. Indeed, Black Friday is the day when retailers start to ... More

The Encryption Conundrum: Should Tech Compromise or Double Down? (The Register)

Silicon Valley should work with the US government in Washington to arrive at a solution that gives law enforcement access to encrypted comms, but that respects individual privacy. ... More

Congress Explores How to Bolster IoT Cybersecurity (BankInfoSecurity)

What's needed to bolster the security of internet of things devices to help prevent cyberattacks, such as the October botnet-driven distributed denial-of-service attack on web se... More

How IBM’s Watson will Change Cybersecurity (InfoWorld)

IBM captured our imaginations when it unveiled Watson, the artificial intelligence computer capable of playing—and winning—the "Jeopardy" game show. Since then, Big Blue has be... More

Weekend Vulnerability and Patch Report, Nov. 20, 2016 (Citadel Information Group)

Important Security Updates Foxit Reader: Foxit has released version 8.1.1.1115 of its Reader to fix six highly critical vulnerabilities. Updates are available on Foxit Softwar... More

PwC Hires Jocelyn Aqua, Set to Focus on Cybersecurity, Privacy Strategy (MESA)

Jocelyn Aqua has joins PwC from the Department of Justice as a principal based in Washington, DC. She joins PwC’s technology, information, communications, media and entertainment... More

Production Security Budgets, Workflows to be Tackled at Dec. 7 Content Protection Summit

How are studios and production companies budgeting for the security needs of film and TV shoots, and what are the baseline measures needed to secure every project? Those are the... More

NSS Labs: Encrypted Web Traffic on the Rise

Cyber security research and testing company NSS Labs is seeing a stark rise in enterprises using both Secure Socket Layer (SSL) and Transport Layer Security (TLS) encryption to sec... More

IT Managers: Employees Consistently Flout Security Policies (Info Security)

Despite investment in cyber security, employees are still putting organisations at risk, according to new research from Databarracks. A new study reveals that nearly two thirds ... More

There is no Standard Career in Cybersecurity. However … (ITSP Magazine)

There is no standard career in cybersecurity. However, people generally work in one of three areas. First, building and/or running an information security program; this could be in... More

Sharing Threat Intel: Easier Said Than Done (Dark Reading)

As cyber threats become more sophisticated and expand to the cloud and the Internet of Things, the sharing of meaningful threat intel  between trusted organizations has become mor... More

The Perfect Cybercrime: Selling Fake Followers to Fake People (New Scientist)

Hackers are recruiting the internet of things into a botnet. But this time they’re not trying to take down the internet. They’re just using them to make fake social media acc... More

MIT Students, Others Teaching IBM Watson About Cybersecurity (Tech Republic)

Mark 2016 as the year that researchers applied artificial intelligence (AI) to the challenges of cybersecurity. If machines can steer our cars and predict our shopping habits, ... More

Will President Trump Be Tough on Online Piracy? (TorrentFreak)

At TorrentFreak we have no interest in reporting on politics, except when it’s relevant to copyright issues. After the surprising victory of Donald Trump earlier this week, se... More

Is the Secure Web Gateway Market Disappearing? (NSS Labs)

As NSS Labs publishes its 2015 Secure Web Gateway (SWG) Market Analysis, the big question in the industry seems to be this: Will next generation firewalls with application control ... More