The Department of Defense cyber community knows it has a critical need for a centralized platform for cyberwarriors, so the joint community is collaborating to ensure the final system has everything everyone needs.
We've seen quite a few articles out there telling you to beware if you use the Safari browser, because attackers can spoof URLs!
According to a report from Bloomberg, Google and Mastercard have signed a secret deal so that Google could track retail sales using Mastercard transaction data. This is yet another proof that Google's true customers are its advertising partners.
The monthly Microsoft security updates --known as the Patch Tuesday updates-- are out, and this month, the OS maker has fixed 62 security flaws, including a recent zero-day vulnerability that was dumped on Twitter last month, and later adopted by a malware campaign.
Olle and his fellow cyber security consultant Pasi Saarinen recently discovered a new way to physically hack into PCs. According to their research, this method will work against nearly all modern computers. This includes laptops from some of the world's biggest vendors like Dell, Lenovo, and even Apple.
Security researcher finds over 3,000 TechNet pages flooded with tech support scams pushing shady phone numbers for cryptocurrency exchanges and social media platforms.
The House Homeland Security Committee is expected to advance a series of bills that will impact DHS operations and infrastructure on topics ranging from bug bounties to drones.
A new report released today shows that distributed denial of service (DDoS) attacks have increased dramatically in the first two quarters of 2018 compared to 2017. The increase in attacks is being attributed to large scale botnets being created by attackers using insecure IoT devices.
This webinar describes the Cyber Security Game (CSG). CSG is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber
Cybersecurity is unique compared to most other business operations, even most IT operations. Unlike marketing or network management-both of which tackle difficult and ever-changing challenges in the business operating environment-cybersecurity pits defenders against intelligent, creative and deliberate opponents.