TB Forum 2014: topic of counter terror in the exposure and conference program
/
0 Comments
TB Forum 2014: topic of counter terror in the exposure and conference progr
Infosecurity Russia-2013: Check Point Become a Sponsor of Firewalls Live-Testing Area
Check Point Software Technologies Ltd. (NASDAQ: CHKP) - the worldwide leader in securing the Internet, become a Sponsor of "Firewalls Live-Testing" at Infosecurity Russia 2013, which is to be held 25-27th September, Moscow, Crocus Expo, Pavilion 2
Hackers may cash in when XP is retired
Hackers could find themselves in the catbird seat on April 8, 2014 -- the day Microsoft plans to stop patching Windows XP. As security expert Jason Fossen sees it, those who have zero-day exploits for XP will bank them until that day and then sell them to crooks or loose them themselves on unprotected PCs.
NSA Responds To Criticism Over Surveillance Programs
The NSA has hit back after mounting criticism about its ability to intercept Web communications domestically, claiming that reports of its capabilities are "inaccurate and misleading."
China’s Internet hit by biggest cyberattack in its history
Were you trying to access a .cn Internet address over the weekend? Are you still hitting refresh?
Internet users in China were met with sluggish response times early Sunday as the country's domain extension came under a "denial of service" attack.
US science fund pumps $20 million into cybersecurity research
US science fund pumps $20 million into cybersecurity research
Snowden suspected of bypassing electronic logs
The U.S. government's efforts to determine which highly classified materials leaker Edward Snowden took from the National Security Agency have been frustrated by Snowden's sophisticated efforts to cover his digital trail by deleting or bypassing electronic logs, government officials told The Associated Press. Such logs would have showed what information Snowden viewed or downloaded.
$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-Time Monitoring to Feds
$6B DHS Cybersecurity Contract Sets Off Race to Supply Real-Time Monitoring to Feds
Pentester at Twitter to Separate Mobile Hacking Hype from Reality at Hacker Hatled
Pentester at Twitter to Separate Mobile Hacking Hype from Reality at Hacker Hatled
Hacker Conference to Announce Chief Information Security Officer of the Year in Atlanta
Hacker Conference to Announce Chief Information Security Officer of the Year in Atlanta
