The Cybersecurity and Infrastructure Security Agency (CISA) recently conducted an in-depth Red Team Assessment (RTA) to enhance cybersecurity in US critical infrastructure sectors. One critical infrastructure organization requested this ass...
There was an unusual level of gloom at the RSA Conference this year, and for good reason: a number of the biggest and most respected security firms have been very recently breached, including RSA Security, VeriSign, and Symantec.
The way that browsers perform SSL certificate-revocation checking is so fundamentally flawed that some browser vendors have turned it off altogether, according to browser vendor representatives in a panel at RSA last week.
The kids filling the room in the above picture are computer hackers. They work their way into computer systems much the same way some might hear about bad guys doing it on the news.
Here at OStatic, we've watched steadily as The Linux Foundation has added significant new members over the years. The organization has, in only a few short years, become an important player in stewarding the Linux ecosystem toward an organized, united future.
An astonishing number of survey respondents believe they are IT security leaders. But what does it really take to be a leader, and how does your organization stack up? A surprisingly high
The hacker group Anonymous, which is less a coherent group of people working together toward a common cause than a random medley of hackers out to prank and disrupt the online world, has been busy these days. Multiple hacks on Bay Area Rapid Transit websites in response to BART's shutdown of the railway's underground cellular system have captured the attention of activists and technophiles alike.
As reported in FierceFinanceIT, 2011 has seen major financial and commercial companies victimized by online breaches. In an effort to beef up security, many of these companies are now turning to certified professional hackers to test and enhance security systems.
The blogosphere is abuzz over the latest Black Hat presentation exposing the security holes of Apple's Mac OS X. The upshot is that Microsoft Windows, in comparison, does a better job of protecting its users, especially against network protocol attacks.
WHY are federal agents hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with them on Friday. They smiled, shook hands, handed out business cards, spoke on a panel called
The Defense Advanced Research Projects Agency on Thursday launched Cyber Fast Track, an effort to fund innovative cybersecurity efforts by groups and people who don't usually do work for the government, including hobbyists, boutique security labs, and other small groups of hackers, DARPA project manager Peiter "Mudge" Zatko announced at Black Hat, a UBM TechWeb event, in Las Vegas.
The advanced persistent threat (APT) attackers behind the newly revealed Operation Shady RAT also deployed a tool called HTran that helps disguise their location.
More arrests could be made as federal authorities take aim at a gang of computer hackers known as Anonymous. So far, 16 arrests have been made which included a 20-year-old UNLV student.
Google's ChromeOS is a browser-based cloud powered operating system that holds the potential to be more secure than other traditional hard disk powered operating systems. According to research from security firm Whitehat, ChromeOS has its strengths, but it also has a few weaknesses too.
For months we've been reading about hacker groups like Lulz Security who reportedly have no agenda other than to create mayhem and laugh-snort at their own clever online exploits.
The copyright litigation factory known as Righthaven has been exposed as making what the Electronic Frontier Foundation said Monday were bogus claims to judges that it
In the Cabinet War Rooms in Whitehall, London - the bunker where Winston Churchill all but ran the UK's second world war operations - cybersecurity specialists summoned by antivirus firm Symantec today explained their views on defeating computer crime ahead of this week's Infosecurity conference in London.
The first-ever social engineering contest at DefCon in Las Vegas last year went way too well: each contestant was able to successfully social-engineer some piece of information, or "flag," out of their targeted company.