In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.
In-brief: A security researcher searching the Internet for insecure data archives stumbled upon an information gold mine: 5 Terabytes of unsecured back ups belonging to one of the globe’s biggest and longest running spam e-mail operations.
In-brief: is having the Chief Executive’s Twitter account secured by a Google Gmail account really a security lapse? Not necessarily.
In-brief: Barnes & Noble said its Nook tablets have not been used to steal data and that it is taking steps to stop using software by the Chinese firm Shanghai Adups Technology Co. Ltd. (ADUPS).
In-brief: The New York Times expose on the hack of the Democratic National Committee is a case study in how not to respond to a cyber attack. In this video interview with Tim Bandos of Digital Guardian, we talk about how to do it right. His new ebook on hunting digital threats in the enterprise explains that incident response doesn’t have to cost a fortune.