Trends

Get expert insights into the latest developments in cybersecurity to stay ahead of emerging threats and evolving technologies. Our in-depth analysis covers everything from new attack vectors and vulnerabilities to cutting-edge security solutions and trends.

  • Open or Closed Source Code Irrelevant to Security

    I spend quite a bit of time talking in front of groups of people, and oneof the things I’m often asked is whether I use open source software (OSS)because I think it’s more secure than proprietary, or ”closed source”,software. I’ll bet this same topic has come up once or twice (this week)in your office, too.…


  • Report: Online Pedophilia up 300 Percent

    Security vendor Panda Software Thursday announced a 300 percent increase in calls reporting online child pornography over the last three years. Protogeles, a European non-governmental organization (NGO) formed to track and remove child pornography from the Internet, said it has received a total of 28,900 complaints and identified roughly 1,900 pedophile communities around the world…


  • More Regulation For The Software Industry?

    SAN FRANCISCO — UPDATED:Richard Clarke, the former White House cyber security czar, urged the technology industry to adopt regulations or even benchmarks to improve security in their products — or face getting walloped with new regulations from Congress. Clarke’s comments came today during a panel discussion here at the RSA Security Conference called “To Regulate…


  • Sobig’s Birthday — Tracking Most Damaging Virus Ever

    A year to the day after the virulent Sobig virus hit the wild, spawning a family ofmalicious attacks that would span the next nine months, anti-virus experts are on dailywatch for the next vicious attack. Sobig-A, the first in a run of six variants, hit the wild a year ago today, Jan. 9. Themalicious family…


  • Weakness Found in Wi-Fi Security Protocol

    A wireless security expert has detected a glaring weakness in the interface design of a highly touted Wi-Fi Protected Access (WPA) protocol deployed in numerous Wireless LAN products. According to a research paper posted on Wi-Fi Networking News, the weakness could allow intruders to crack poorly chosen passphrases via offline dictionary attacks. The weakness detailed…


  • Hatch: P2Ps Are Child Porno Central

    In a twisted turn of unintended consequences, the enormous success of the Internet as a distribution vehicle for pornography has created competitive pressures among smut purveyors to provide more depictions than ever of children engaging in violent and deviate sexual conduct. John G. Malcolm, deputy assistant attorney general in the Criminal Division of the Justice…


  • Best Buy or Biggest Scam?

    Electronics retailer Best Buy Thursday became the latest victim of a scam plaguing e-commerce sites. An e-mail ostensibly alerting readers to theft of their credit card numbers asked them to click on a link to the consumer electronics retailer’s fraud department.While the link read “http://www.BestBuy.com/fraud_department.html,” it actually redirected the user to a fake Best Buy…


  • College Hacking Course Kindles Fiery Debate

    A new college course is stirring up a firestorm of debate in the security community. The University of Calgary in Canada is opening registration next week on a course, slated to start in the fall term, that will teach students how to write viruses and worms. Educators say it’s not a dream class for the…


  • Massive DDoS Attack Hit DNS Root Servers

    A massive distributed denial-of-service (DDoS) attack of unknown origin briefly interrupted Web traffic on nine of the 13 DNS “root” servers that control the Internet but experts on Wednesday dismissed the overall threat as “minimal.”Sources say the one-hour attack, which was hardly noticeable to the average end-user, was done via ICMPrequests (ping-flooding) to the root…


  • Top 10 Enterprise Security Risks

    Network administrators are besieged today with a growing list of security risks, and analysts warn that too often they get caught up in battling one or two vulnerabilities and remain blind to a league of others. “There are so many risks to deal with, it’s an overwhelming job,” says Dan Woolley, a vice president at…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies