Blog

Printers: The New Hackers’ Instrument of Havoc?

June 24, 2014

According to recent research, there are many common office devices that are major hacking targets. In the past decade, printers have become more high-tech with Web, email, and WiFi capabilities, without the security to protect them from unwanted attacks. According to the Technology Review,

Read More

Government Report Finds Smart Grid Security Inadequate

June 24, 2014

A new document from the U.S. Government Accountability Office--the auditing office of the U.S. Congress--assessing the current state of security of the rapidly deploying smart grid networks around the country finds that necessary built-in security features are often missing from the networks and the smart meters themselves.

Read More

New Book Explores Evolution of State-Sponsored Cyber Crime

June 24, 2014

Covering the progression of cyber-espionage and state-sponsored cyber attacks, security expert Richard Stiennon's new book Surviving Cyberwar provides a comprehensive look at the technological and political landscapes surrounding cyberwar.

Read More

What Lies Ahead for Internet Security

June 24, 2014

In a recent blog post, Symantec's Kevin Haley offers a comprehensive list of predictions about the direction of Internet Security in 2011. Among the predictions are:

Read More

Critical Infrastructure Under Political Cyberattack

June 24, 2014

With the recent findings that the Stuxnet worm was indeed sophisticated malware designed as an industrial weapon, concerns about the cybersecurity of industrial and critical infrastructure are at an all time high. Now comes a report that over half of critical infrastructure has already been the target of politically-motivated attacks.

Read More
COMMENTS