Week in review: DDoS attacks becoming more effective, and how to build trust between business and IT
Here's an overview of some of last week's most interesting news, articles and interviews: Gathering and using threat intelligence In this interview, Tomer Teller, Security Innovation Manager at Check Point, talks about the role of threat intelligence in the modern security architecture, discusses how it can help identify sophisticated malware attacks, and illustrates the essential building blocks of a robust threat intelligence solution.
Week in review: “Lawful interception” mobile malware, top infosec tech in 2014, and the new issue of (IN)SECURE Magazine
Here's an overview of some of last week's most interesting news, articles and interviews: (IN)SECURE Magazine issue 42 released (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics.
Week in review: GCHQ intercepts Google, Facebook users' communications, Code Spaces destroyed by extortion hack attack
Here's an overview of some of last week's most interesting news, podcasts, interviews and articles: Five great computer security tips that few people follow Here are five rarely implemented security practices that offer great security benefits, but which few people actually apply in real life.
Week in review: Replicating NSA's gadgets using open source, World Cup-themed threats, and life after TrueCrypt
Here's an overview of some of last week's most interesting news, podcasts, interviews and articles: Replicating NSA's gadgets using open source In this podcast recorded at Hack In The Box Amsterdam 2014, wireless security researcher Michael Ossmann shares his insights on what to use - and how - to duplicate hardware devices found in the ANT catalog.
Week in review: Defeating UEFI's SecureBoot, Gameover Zeus botnet disrupted, first Android file-encrypting Trojan
Here's an overview of some of last week's most interesting news, interviews, podcasts and articles: International action against Gameover Zeus botnet and CyptoLocker ransomware On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led by the FBI which ensured the disruption of the Gameover Zeus botnet and the seizure of computer servers crucial to the malicious software known as CryptoLocker.