Quantcast

Latest Cyberwarfare Stories

2014-06-03 12:34:05

iThreat Cyber Group & InsideCounsel Magazine Gauge Corporate Ability to Thwart Adversarial Attacks PRINCETON, N.J., June 3, 2014 /PRNewswire/ -- Two out of three legal counsels representing a cross section of Fortune 1,000 companies acknowledge they are not "very well prepared" to prevent a significant, material attack on their product, brand or intellectual property, according to a new survey by InsideCounsel Magazine commissioned by iThreat Cyber Group. "These results are telling," stated...

2014-06-03 08:22:24

RISHON LEZION, Israel, June 3, 2014 /PRNewswire/ -- During the recent Technology Fair at the Computer Science School at The College of Management-Academic Studies [http://www.colman.ac.il/english/Pages/default.aspx ] (COMAS), Israel's high-tech and venture capital executives were searching for the most innovative new technologies among the seventy-two projects on display. Known outside Israel to all the most astute watchers of the high-tech scene, and located between...

Malicious Software Networks Shut Down By US-Led Investigation
2014-06-02 15:13:58

Peter Suciu for redOrbit.com - Your Universe Online On Monday the United States Department of Justice (DOJ) announced that it had lead a multinational action against the "Gameover Zeus" botnet and "cryptolocker" ransomware. These malware programs made up a global network of infected computers that were used by cyber criminals to steal millions of dollars from businesses and consumers. The DOJ unsealed criminal charges in Pittsburgh, Pennsylvania and Omaha, Nebraska against an...

2014-06-02 08:27:30

App Reputation Feature For Enterprises Enables Control, Visibility and Security for Mobile Device Apps SAN MATEO, Calif., June 2, 2014 /PRNewswire/ -- Mojave Networks, the leading provider of cloud-based mobile security for enterprises, today unveiled a new application reputation feature to provide enterprises with detailed insight into the applications that are being run on employee mobile devices. With this new feature, organizations can dissect and analyze the data being collected, stored...

2014-05-31 23:05:44

As the Iranian cyber espionage attack called Newscaster is exposed, the power of social engineering again steps into the spotlight. Joe Caruso, founder and CEO/CTO of Global Digital Forensics, discusses the lessons US businesses should take from this type of attack, and the necessity to raise social engineering awareness at every level within an organization to improve cyber security posture. New York, NY (PRWEB) May 31, 2014 With over a billion active users monthly from all around the...

2014-05-30 08:27:08

Two leaders in security drive a coordinated industry effort against cybercrime and cyber criminals SUNNYVALE, Calif. and SANTA CLARA, Calif., May 30, 2014 /PRNewswire/ -- Fortinet (NASDAQ: FTNT) and Palo Alto Networks (NYSE: PANW), leading innovators in network security, have co-founded the industry's first cyber defense consortium. The mission of this consortium is to drive a coordinated industry effort against cybercrime and cyber criminals through deep collaboration on threat intelligence...

2014-05-29 23:10:55

New Vulnerability Management Package Targets Midmarket Organisations Portland, OR (PRWEB) May 29, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360TM Express Bundle 1600 in the U.K. The Tripwire IP360 Express Bundle 1600 is a competitively priced vulnerability management package specifically designed for small to medium-sized businesses and channel partners. Information...

2014-05-29 23:02:44

Network Penetration Testing provides security for an overlooked essential requirement for HIPAA Compliance for at-risk practices and medical industry fields as well as at-risk corporate entities. 5i Solutions Inc.* offers over 24 years of experience in the field of enterprise management solutions. Fort Lauderdale, FL (PRWEB) May 29, 2014 5i Solutions Inc. announces a 12-year anniversary successfully providing Network Penetration Testing, a safeguard for companies in need of proven...

2014-05-29 08:33:51

1 in 7 Notified of Personal Data Breach Last Year; Victims of E-mail Phishing Scams Up 22 percent from 2012 YONKERS, N.Y., May 29, 2014 /PRNewswire-USNewswire/ -- Despite a rash of high-profile data breaches and cyber threats, an alarming 62 percent of U.S. online consumers have done nothing to protect their privacy on the Internet, according to a recent national Consumer Reports survey. Perhaps not surprisingly, the number of victims is on the rise. One in seven online consumers...

2014-05-28 23:06:51

Showcases Real-Life Cyber Scenarios That Can Negatively Impact Federal Agencies Warwick, NY (PRWEB) May 28, 2014 SwishData, a woman-owned group of leading data performance architects for the federal marketplace, today announced the launch of a new online resource called “Cyber Attack Defenders,” which shines a light on the real dangers and realities that federal agencies face when it comes to cyber security. The first video in the campaign called “The Defenders” showcases a...


Word of the Day
mundungus
  • A stinking tobacco.
  • Offal; waste animal product; organic matter unfit for consumption.
This word comes from the Spanish 'mondongo,' tripe, entrails.