DDoS Protection Blog

Data encryption in the cloud is not enough to keep the feds from eying your data if they want to

The New York Times reported that Microsoft has collaborated with the National Security Agency (NSA)more extensively than it previously acknowledged. According to classified internal NSA newsletters that were disclosed by the former NSA contractor Edward Snowden, Microsoft has helped the NSA find ways to circumvent its encryption on its Outlook.com...

Read more

EDA Overreacts to Malware Scare

The Economic Development Administration (EDA) in Washington, D.C. physically destroyed computers and other IT equipment worth $170,000 in a comedy of errors sparked by a relatively harmless malware incident, according to an audit report. The report by the inspector general’s office in the Department of Commerce, released late last month,...

Read more

Def Con Asks Feds to Stay Away

In further fall-out from the Edward Snowden spying revelations, the organizers of the hacker's convention Def Con this week asked officials of the federal government to stay away from the event. In a post on the Def Con website, the founder of the event Jeff Moss said: “When it comes to sharing and socializing with feds, recent...

Read more

Don’t Write Your BYOD Policy from Scratch – Check Out These Samples to Jumpstart Your Own Policy

Whether or not your organization allows employees to use their personally owned devices to access corporate resources, you need to have a written policy that covers the acceptable use of mobile devices. This policy should clearly communicate to all employees what is, and is not, acceptable use of their smartphones, tablets and other mobile devices...

Read more

McAfee Says South Korea Is Cyber Espionage Target

The cyber attack on South Korean banks and media outlets in March was part of a wider four-year military espionage operation against the Seoul government, McAfee Labs said this week. In an analysis of a series of hacking attacks on South Korea since 2009, the security software company said the attackers used a remote-access Trojan to compromise...

Read more

More Posts