Energy lab releases open-source tool for tracking cyberattacks
Hone, a tool being developed at the Pacific Northwest National Lab, links network traffic with an application, making it easier to find the source of an IT compromise.
Hone, a tool being developed at the Pacific Northwest National Lab, links network traffic with an application, making it easier to find the source of an IT compromise.
Vito Corleone had an elegant solution to identifying the source of clandestine attacks.
A hacker who posted racy photos gloating about his hack of police officers' home addresses didn't realize the pictures were GPS-tagged and time-stamped.
The recently discovered SabPub and LuckyCat exploit Word vulnerabilities and are a sign Mac users need to get wise about patching, security experts say.
With the coming post-PC architecture, sensor, device and cloud components will form a new multi-machine OS with built-in solutions for security and ID management.
Internet advocacy groups oppose the information-sharing bill, which does have the support of some heavy industry hitters.
A second draft of guidelines for creating a crypto key management system addresses one of the greatest challenges in securing sensitive information.
DARPA's "active authentication" would be a welcome alternative to passwords and other cumbersome credentials.
E-mail campaign tries to fool service members receiving disability payments into giving up their personal information, including tax returns.
More than a quarter of U.S. health care providers in a recent survey experienced a breach of patient data in the past year, continuing an upward trend.