Home Tags Defend

Tag: Defend

Bay Area: Join us 4/19 to talk tech, the police, and...

Meet a Bay Area lawyer who represents accused criminal hackers, including weev.

Wassenaar Arrangement: When small words have the power to shatter security

Katie Moussouris explains why a battle over wording could break the Internet's ability to defend itself.

How to remove ransomware: Use this battle plan to fight back

Ransomware doesn’t sneak into your PC like ordinary malware.
It bursts in, points a gun at your data, and screams for cash—or else.

And if you don’t learn to defend yourself, it could happen again and again. Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, an increase of 167 times year over year, according to Sonicwall—even as the number of malware attacks declined. Why steal data when you can simply demand cash?To read this article in full or to leave a comment, please click here

TopSpin Security’s DECOYnet Uses Deception to Defend Networks

TopSpin Security's DECOYnet uses deception to defend networks against hacker intrusions by using deceptive tactics that direct attackers to decoy resources and traps.

Hacktivist or script kiddy? Know your 10 types of hacker

Different shapes and sizesImage by ThinkstockHackers, like the attacks they perpetrate, come in many forms, with motivations that range from monetary to political to ethical. Understanding the different types of hackers that exist and what motivates them can help you identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

Travis Farral, director of security strategy at Anomali, outlines the top 10 types of hackers you should have on your radar.To read this article in full or to leave a comment, please click here

Cisco Scales Mobile Security for 5G

As the era for 5G mobile networks nears, there will be increased security demands that will require new technologies to defend users and carriers.

Cisco is aiming to help meet the challenge with its new Security Architecture for Mobile Service Providers.

Decrypted: The Expanse: OK, so we broke a few laws of...

This week we speak to Mika McKinnon about being a science consultant on TV shows, among other topics.

Blockchain’s New Role In The Internet of Things

With next gen 'distributed consensus' algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices

The Great Wall is my new favorite lizard monster war movie

This movie has everything that is best in life.

Did Facebook steal the design for its data center in Sweden?

Lawsuit claims Facebook "simply stole" the design "and passed it off as its own."

Medical device ‘birth certificates’ could solve healthcare security woes

Can "digital birth certificates" defend medical devices against cyberattacks?

Doom co-creator defends his code against ZeniMax copying accusations

During expert testimony, the Oculus CTO "just wanted to shout 'You lie!'"