Oscar winner Alex Gibney said Wednesday he hopes his new documentary "Zero Days" exposing the secret scope of the US cyber warfare program will "rattle some cages" to trigger a debate about a global IT arms race.
Oscar winner Alex Gibney said Wednesday he hopes his new documentary "Zero Days" exposing the secret scope of the US cyber warfare program will "rattle some cages" to trigger a debate about a global IT arms race.
When companies want to acquire new customers, they seek out the fastest, most cost-effective ways to attract business. Online attackers take the same approach when looking for their “customers” – that is, new targets for exploits to steal data and hijack accounts.
The inclusion of backdoors in encryption tools would introduce new technological risks to IT infrastructure and might turn systems designed for law enforcement into vulnerabilities, a recent paper from the European Union Agency for Network and Information Security (ENISA) states.
Researchers at Palo Alto Networks have performed an in-depth analysis of Fysbis, the preferred Linux malware used by the Pawn Storm threat group. The simple, yet efficient tool is proving to be effective because Linux security in general is still a maturing area, the experts say.
Does Discussing IT Security Spending Have to be Extremist or Establishment?
Researchers at Germany-based Blue Frost Security discovered a high severity vulnerability in FireEye products that allowed malicious actors to bypass the company’s detection engine and temporarily whitelist malware.
UK-based Darktrace, a cyber security startup that leverages machine learning and mathematics to detect threats, announced on Tuesday that it has extended its self-learning threat detection technology to virtualized environments.
A U.S. magistrate judge ordered Apple on Tuesday to help the FBI search an iPhone belonging to the man behind the recent mass shooting in San Bernardino, California.