GUEST OPINION by Jim Cook, ANZ Regional Director, Attivo Networks: With cybercriminals always on the hunt for new ways to mount attacks, organisations are paying more attention to the weaknesses that exist within many deployments of Microsoft’s Active Directory (AD).
Cyber security vendor FireEye has a considerable amount of egg on its face after the tools used by its Red Team — an attack unit — have been stolen by a group that it claims is a "highly sophisticated state-sponsored adversary".
Russian security firm Kaspersky has published a blog post about the alleged threat to Linux from targeted attacks and so-called advanced persistent threats — code for state-based actors — that falls squarely into the category known as FUD.
How long have you been with the CIA?
Please do not use all-caps in your replies; it is the digital equivalent of shouting.The information published by Julian Assange[…]
Sam, as Magistrate Baraister said, all of the arguments of the Assange "Defense Team" were either incorrect or irrelevant, save[…]
What is the crime that Julian Assange has committed? As a publisher, he has published leaked information of public interest.[…]
Ready for this? In January my account was compromised, I am not sure if I click on a site I[…]