Infosecurity News

  1. #BHUSA Empathy is Key to Hiring and Retaining Women in Cybersecurity

    Rebecca Lynch of Duo Security gave a talk on hiring, and just as importantly retaining, women in the cybersecurity industry.

  2. #BHUSA: Five Years of Google Project Zero Should Influence Similar Groups

    Project Zero boss looks back at five years of research

  3. #BHUSA: Increase Social Media Awareness With Active and Passive Testing

    A new tool enables active social media testing.

  4. #BHUSA: Defending Against Morphing DDoS with SODA

    F5 Labs researchers release a new open source tool and model to help organizations prepare for and defend against an emerging form of disruptive attack.

  5. Researchers Detect Spambot Recording Victims' Screens as They Watch Sexual Content

    Malware-distributing spam campaigns are targeting people in France

  6. FireEye Identifies Prolific Chinese Cyber-Threat Group

    APT41 has targeted various industries across multiple jurisdictions.

  7. Researchers Reveal 35 Flaws in Six Printers

    Sysadmins urged to patch after latest discovery

  8. CafePress Slammed After Major Breach Affecting 23 Million

    Exposed data included unique email addresses and passwords

  9. #BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk

    Reclassifying phishing attacks, and the ways to help users spot them

  10. North Korean Hackers Amass $2bn Via Cyber-Attacks

    Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN

  11. #BHUSA : Open Source is Key to Solving Cyber Skills Gap

    At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry

  12. #BHUSA: Keynote Encourages Positivity and Collaboration

    The Black Hat USA keynote encourages better collaboration and a more positive culture

  13. LokiBot Gets Sneakier With Steganography

    LokiBot is getting stealthier and is now hiding its devastating payload in image files.

  14. IBM's Warshipping Attacks Wi-Fi Networks From Afar

    Forget wardriving; warshipping is a more targeted way to hit a company's wireless network, says IBM.

  15. Children's Tablet Revealed Location, Researchers Found

    LeapFrog's Pet Chat app was leaking children's location, say researchers.

  16. #BHUSA: Need For Technologists to Be Recognized and Empowered

    Why the world needs to empower technologists

  17. #BHUSA: Jeff Moss Talks of Need to Be Better Communicators

    Now Politicians and boards know cybersecurity, what do we do with the attention?

  18. AT&T Workers Bribed to Unlock Millions of Customer Phones

    DoJ indicts man who allegedly paid staff hundreds of thousands

  19. Over 50% of Enterprises Are Failing on Cloud Security

    Symantec report reveals app adoption is outpacing security efforts

  20. New Intel SWAPGS Flaw Spells Bad News for Users

    Firms and consumers urged to patch

What’s Hot on Infosecurity Magazine?