Jerri Nielsen: Surviving the Last Place on Earth

There may be no place on Earth less visited by humans than the South Pole. Despite a permanent research base with buildings clustered about the...

Salted Hash Ep 11: Dyn Inc. DDoS anniversary, and the truth about the Reaper...

For this week's episode of Salted Hash, we're joined by Josh Shaul, the vice president of web security at Akamai. He shares his story about his experiences during the Dyn Inc. DDoS attacks,...

Linux Fu: File Aliases, Links, and Mappings

Have you heard it said that everything in Linux is a file? That is largely true, and that’s why the ability to manipulate files is...

42 Android Models infected with data stealing banking trojan

There are 42 cheap Android models currently infected with Triada banking trojan stealing data and intercepting chats from targeted devices.The IT security researchers at Russia-based anti-virus firm Dr.Web have identified 42 low-cost Android devices...

FPGA Magic Puts Little Embedded Screens Up On The Big Screen

Old-school handheld gaming platforms have a certain charm, but it’s fair to say that their relatively tiny screens don’t lend themselves to wider...

Security lessons from the 2018 Pyeongchang Winter Olympics

Technology races ahead, seducing us with shiny buttons that go "ping!" Meanwhile, security cleans up the mess--or tries to.Sound familiar? We see this drama play out across industry and government, even the Olympics....

Facebook’s Data is for sale all over the world said Steve Bannon

Steve Bannon said that he didn’t know anything about the Facebook Data Mining and Cambridge Analytica scandal. He is a former VP and board member of the political consultancy. He also claimed that...

(ISC)² Item Writing Explained – (ISC)² Blog

To ensure the CISSP exam remains up-to-date and relevant to the industry, we are constantly working on the exam items (aka “questions”), and that process is 100% member-driven!  (ISC)² spoke with Lisa Vaughan, CISSP,...

LATEST NEWS

MUST READ