DDoS Attacks Spike 80% in Q4 2014
DDoS-for-hire, multi-vector attacks and reflection techniques drove up the size and duration of the attacks in Q4.
China to Require US Tech Companies to Submit Source Code for Inspection
The rules apply to the Chinese banking sector, but there is concern that they could be expanded to other verticals.
US Military to Replace Passwords with "Cognitive Fingerprints"
How someone types and word-processes can be more personally identifying than simple biometrics.
Do You have Vulnerability Research to Showcase?
Call for papers for Infosecurity Intelligent Defence 2015
Insider Threat Alert as Former Spokesman Allegedly Leaks Corporate Data
TPG Global man alleged to have altered docs before sending them to the press
Regin Was Work of Five Eyes Spooks, Analysis Reveals
Kaspersky Lab finds link to QWERTY code leaked by Snowden
Github Ups Maximum Bug Bounty Reward to $10,000
Developer site hoping more researchers will find security holes in the platform
NFL in Privacy Fumble as App Leaks Data
Hackers could MITM Super Bowl fans and make off with sensitive info, says Wandera
Admins Urged to Patch Linux Now as 'Ghost' Bug Emerges
Latest flaw could allow remote code execution
Data Protection Warning: Prepare Now for New EU Privacy Laws
Ninth annual Data Protection Day an opportunity to start compliance work, say experts
Facebook Attributes Outage to Internal Errors, Not Malicious Actors
Social networking giant moves to dampen speculation linking the service outage to Lizard Squad
IT Leaders Flying Blind Over New EU Security Laws
FireEye report claims lack of guidance is hampering compliance work