Articles: 28 | Last update: Jul 29, 2014 9:46:00 PM | Start: Jul 28, 2014 5:26:00 PM | Sources: 24
Sometime between October 2011 and August 2012, a digital attack permitted access to sensitive technical data regarding Israel's "Iron Dome" defense system which had been stored on the networks of three Israeli defense firms. The revelation was first disclosed Monday in a blog post by Krebs on Security ....
Articles: 27 | Last update: Jul 29, 2014 8:42:00 PM | Start: Jul 28, 2014 1:09:00 PM | Sources: 21
Thanks to technology, the business world is shrinking. Compared to prior decades, it is becoming far easier for businesses to operate in multiple countries. While this has the potential of being great, it also can be bad. After all, economies are not puzzle pieces that fit together nicely....
Articles: 15 | Last update: Jul 29, 2014 11:52:00 PM | Start: Jul 29, 2014 3:41:00 PM | Sources: 15
'Chinese State-Sponsored Actor' Accused of Cyber Intrusion A "highly sophisticated Chinese state-sponsored actor" is responsible for a recent data breach at the National Research Council of Canada, according to Canada's chief information officer....
Articles: 12 | Last update: Jul 29, 2014 11:30:00 PM | Start: Jul 28, 2014 9:19:00 PM | Sources: 10
Proposal "is not perfect" but less surveillance is better than mass surveillance....
Articles: 8 | Last update: Jul 29, 2014 11:41:00 PM | Start: Jul 29, 2014 6:36:00 AM | Sources: 6
Other categories: Ongoing threats;
The bill, if enacted, would codify the National Cybersecurity and Communications Integration Center, an agency within the Department of Homeland Security that fosters real-time cyberthreat information sharing with critical infrastructure operators. It … The post How House Passed 3 Cybersecurity.......
Articles: 6 | Last update: Jul 29, 2014 11:40:00 PM | Start: Jul 29, 2014 5:12:00 PM | Sources: 6
Secusmart voice, data encryption for anti-eavesdropping caters to anti-NSA crowd...
Articles: 4 | Last update: Jul 29, 2014 9:41:00 PM | Start: Jul 29, 2014 4:16:00 AM | Sources: 4
Georgia Institute of Technology's applied research arm has launched an early warning system to help organizations prepare for possible cyberattacks. The Georgia Tech Research Institute (GTRI) developed the open source system called BlackForest , which will complement the institute's malware and spear-phishing intelligence systems....
Articles: 3 | Last update: Jul 29, 2014 10:45:00 PM | Start: Jul 29, 2014 10:12:00 PM | Sources: 3
Proofpoint, Inc. (NASDAQ: PFPT), a leading security-as-a-service provider, today announced its scheduled participation at the following upcoming conferences: read more...
Articles: 3 | Last update: Jul 29, 2014 10:13:00 AM | Start: Jul 28, 2014 8:46:00 PM | Sources: 0
It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access. These weak links have certainly placed third-party security into the spotlight....
This website is managed by CERT-EU. Find out more about us.
For questions or comments, please contact us at:
PGP Fingerprint: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383
Select top stories in other languages.