DDoS Protection Blog

Don’t Write Your BYOD Policy from Scratch – Check Out These Samples to Jumpstart Your Own Policy

Whether or not your organization allows employees to use their personally owned devices to access corporate resources, you need to have a written policy that covers the acceptable use of mobile devices. This policy should clearly communicate to all employees what is, and is not, acceptable use of their smartphones, tablets and other mobile devices...

Read more

McAfee Says South Korea Is Cyber Espionage Target

The cyber attack on South Korean banks and media outlets in March was part of a wider four-year military espionage operation against the Seoul government, McAfee Labs said this week. In an analysis of a series of hacking attacks on South Korea since 2009, the security software company said the attackers used a remote-access Trojan to compromise...

Read more

Are You a Tim McGee Wannabe? Check Out the New Certified Cyber Forensics Professional Certification

If you’ve ever watched the TV show NCIS and thought how cool it would be to have a job like Tim McGee, the cyber forensics scientist, then I have good news for you. The International Information Systems Security Certification Consortium, Inc., (ISC) ², has recently announced the availability of a new certification, the Certified...

Read more

Researcher Says Vulnerability Affects Nearly Every Android Phone

Bluebox Security reported this week it had discovered a vulnerability affecting 99 percent of Android cell phones that allows a hacker to do anything from steal data to create a mobile botnet. “The implications are huge,” Bluebox chief technical officer Jeff Forristal said in a blog post “This vulnerability, around at...

Read more

Video Games Maker Says Website Hacked

Ubisoft, the video game developer and distributor, warned clients this week that its website had been hacked and urged all users to change their passwords. In a post on its website, the company said hackers had recently gained access to some of its online systems and stolen user names, e-mail addresses and encrypted passwords. "No...

Read more

More Posts