Intrusion Detection Software

Intrusion Detection Software | News, how-tos, features, reviews, and videos

Inspecting a tablet magnifying glass businessman

7 keys to better risk assessment

When bad guys penetrate a network, too many defenders worry about what they stole rather than how they broke in. Focus on causes! Here's how

arithmetic math graffiti

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does

light from window

Researchers find way to steal Windows Active Directory credentials from the Internet

The technique could enable attackers to attack Windows servers hosted in the cloud

hacked hacker breach security

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

United Airlines Boeing 747SP, on approach to runway 09L at London Heathrow airport [June 13, 1992].

OPM, Anthem hackers reportedly also breached United Airlines

Flight manifests including passenger information and destinations were stolen, report claims

Researchers disclose four unpatched vulnerabilities in the mobile version of Internet Explorer

The reports contain limited information, making exploit development hard and unlikely

cardinals baseball

FBI investigates St Louis Cardinals over Houston Astros hacking

Suspicions were raised after internal Astros information began appearing online last year

03 point of sale

Cybercriminals increasingly target point of sales systems

Trustwave highlights the difference in data-breach activity between North America and the rest of the world

hunting orange

Adobe invites help hunting vulnerabilities in its online services

The company offers no bounties, just public kudos

pyramid eye money

Report: NSA not only creates, but also hijacks, malware

Documents leaked by Edward Snowden show the NSA hijacks botnets and computers infected with malware by other intelligence agencies

thunderbolt lightning storm skies nighttime

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said

Magnifying loupe on the laptop keyboard    147860345

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

Attack hijacks DNS settings on home routers in Brazil

Attackers use cross-site request forgery techniques to change router settings when users visit malicious websites

Why hackers may be stealing your credit card numbers for years

Hackers may have the upper hand for years as the retail industry slowly upgrades its systems, analysts said

Retailers urged to defend against 'Backoff' point-of-sale malware

The PCI Security Standards Council says the Backoff malware is 'a very real threat'

towerbridge

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals

Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program

home router

Many home routers supplied by ISPs can be compromised en masse, researchers say

Some ISP servers used to manage routers provisioned to customers can be hacked from the Internet, researchers from Check Point said

Network-attached storage devices more vulnerable than routers, researcher finds

A security review found serious vulnerabilities in 10 popular NAS systems

Hacker group targets video game companies to steal source code

The group has ties to the Chinese hacker underground and uses custom tools to attack companies, researchers from Dell SecureWorks said

Internet of things devices contain high number of vulnerabilities, study finds

Security researchers from Hewlett-Packard found 250 security issues when analyzing 10 popular IoT devices

Load More
You Might Also Like