Intrusion Detection

Intrusion Detection news, information, and how-to advice

15 10cwdsecurity

Police break up cybergang that stole over $15 million from banks

Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

nac 1

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use

securiy companies watch

10 security startups to watch in 2015

With IT spending on security on the increase, here are 10 security newcomers hoping to be worthy of corporate customers

Magnifying loupe on the laptop keyboard    147860345

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

serverskulls header

'Spike' toolkit seeks routers, Internet of things for DDoS botnet

Security researchers have recently discovered a toolkit capable of infecting computers, routers and Internet of Things devices to launch large-scale simultaneous DDoS attacks.

Hackers exploit critical vulnerability in popular WordPress theme component

WordPress admins should check if their sites use the Slider Revolution plug-in and update it immediately, researchers said

Data shows Home Depot breach could be largest ever

The breach occurred at nearly all of Home Depot's 2200 U.S. stores

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

Is your Dropcam live feed being watched by someone else?

Two researchers will show at Defcon how a Dropcam monitoring camera could turn into a Trojan horse

Google thinks global Internet security with Project Zero

Newly formed team of security researchers wants to root out security issues with popular software, not just Google's

Botnet uses brute force to access PoS systems

A new malware threat scans the Internet for PoS systems and tries to access them using common usernames and passwords

Energy providers hacked through malicious software updates

Symantec says the Dragonfly campaign, originating in Eastern Europe, sought to gain persistent access to energy suppliers

Microsoft's new cyber security community may stay empty

Now in beta for Azure subscribers, Microsoft hopes its online community and tracker will help IT deal with threats faster

Murder in the Amazon cloud

The demise of Code Spaces at the hands of an attacker shows that, in the cloud, off-site backups and separation of services could be key to survival

Second Chinese army unit linked to corporate cyber espionage

Internet postings link a Chinese hacking group to a military unit

5 lessons from companies that get computer security right

Computer security is in tatters -- but not everywhere. Learn from the companies that know what they're doing

Public utility compromised after brute-force attack, DHS says

The utility, which was not identified, used a simple password system and had been compromised before

With the Internet of things, smart buildings pose big risk

As buildings get more automated, they raise new security risks

Load More