In-brief: Google is pushing an approach to network security dubbed “tiered access,” demoting the trusted password, which is now just one piece of data that is needed to get access to sensitive data and resources on Google’s network.
In-brief: We don’t know if the Vault 7 tools belonged to the CIA. We do know that they were used by a group Symantec dubbed Longhorn that possessed powerful zero day exploits, never attacked computers in the US and used code words taken from lyrics by 80s band The Police, so…
In-brief: Like Love Canal or the ‘flaming river’ in Cleveland that eventually prompted anti-pollution laws, the casual leak of data on 33 million U.S. professionals is a sign that our online environment is badly compromised. But can we fix it? (Editor’s note: this blog post originally appeared on Digital Guardian’s blog.)
In-brief:The tactics of cyber criminal hacking crews are indistinguishable from those of sophisticated, state sponsored “advanced persistent threat” groups, the firm FireEye said in its most recent M-Trends report.
In-brief: Researchers at Anubis Networks claim that Necurs, one of the world’s largest botnets, has added a feature for launching denial of service attacks.