November 23, 2016

NCIS Episode? This one is real...
After analysis by HPES and a continuing Naval Criminal Investigative Service (NCIS) investigation, it was determined Nov. 22, 2016, that sensitive information, including the names and Social Security Numbers of 134,386 current and former Sailors were accessed by unknown individuals.

 October 21, 2016

Dirty Cow Linux Vulnerability Found
The operating system that lies at the core of most servers on the Internet and most smartphones has a critical vulnerability which has existed, unnoticed, for nine years.

 September 28, 2016

My First Car Was a Y^i72b(lV$
Time to Kill Security Questions—or Answer Them With Lies. From their dangerous guessability to the difficulty of changing them after a major breach like Yahoo’s, security questions have proven to be deeply inadequate as contingency mechanisms for passwords.

 August 20, 2016

Massive Locky ransomware attacks hit U.S. hospitals
Locky ransomware is back in the spotlight, after FireEye Labs, a cybersecurity and malware protection provider, observed the virus has evolved and is targeting hospitals with a massive campaign.

July 5, 2016

Again... Symantec Scrambles to Fix Flaws After Google Sounds Alarm
Symantec last week confirmed that it had developed fixes for a series of eight vulnerabilities found in its portfolio of security products for enterprise and consumer customers, after an outside researcher identified the problem.

June 13, 2016

Symantec to buy Blue Coat for $4.65bn
5 reasons Symantec is buying Blue Coat.

May 20, 2016

Google Project Zero discloses dangerous Symantec vulnerability
Google Project Zero disclosed a Symantec vulnerability that can be exploited with zero interaction and was described being as bad as it can possibly get.

May 13, 2016

89 Percent of Healthcare Organizations Were Breached in the Past Two Years
And 45 percent were breached five or more times in the same period of time, a recent survey found.

March 23, 2016

One Step Forward, Two Steps Back
Stagefright flaw still a nightmare: '850 million' Androids face hijack risk.

February 15, 2016

Linux Servers Subject to New Advanced Persistent Threat
Russian cyberspy group uses simple yet effective Linux Trojan.

January 15, 2016

Websense is Renamed
Meet Forcepoint: Raytheon's Newly Renamed Cyber Business

November 4, 2015

iboss Gets a Huge Boost to Fund Growth
Goldman Sachs' Private Capital Investing group invests $35 million in iboss Cybersecurity

July 1, 2015

Cisco Ups Cloud Security Game With $635 Million Purchase Of OpenDNS
To fulfill the increasing demand for more secure products and services, the company has announced its plans to acquire cloud-based security company OpenDNS...

June 30, 2015

What Is Juice Jacking and How Worried Should You Be?
Although juice jacking isn’t as widespread a threat as outright phone theft or exposure to malicious viruses via compromised downloads, you should still take common sense precautions to avoid exposure to systems that may malicious access your personal devices.

April 20, 2015

Raytheon to buy Websense
U.S. arms maker Raytheon Co (RTN.N) said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.

April 7, 2015

Singtel Acquires Trustwave 
Singtel, the biggest telecommunications firm in Southeast Asia with over 500 million mobile customers, will acquire Chicago-based cybersecurity company Trustwave in a deal worth $810 million.

March 23, 2015

Major Anti-Virus Company Has Close Ties to Russian Spies
Kaspersky Lab has abruptly changed course...high-level managers have left or been fired, their jobs often filled by people with closer ties to Russia’s military or intelligence services...

January 20, 2015

Detection Technology Identifies Malware Without Examining Source Code
Hyperion, new malware detection software that can quickly recognize malicious software even if the specific program has not been previously identified as a threat...

November 10, 2014
Home Depot Blames Windows for Record Hack 
The Wall Street Journal has learned more details about the attack, revealing that hackers used a Windows machine as a point of entry, from which they were able to spread the malware and collect customer data.
September 3, 2014
Admins Grapple With Shadow Tech
"Shadow IT" is a term applied to technology deployed by an organization's users outside
the purview of the IT department.
August 5, 2014
Russian Hackers Amass Over a Billion Internet Passwords
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.
February 17, 2014
Ready for the OUTernet?
By leveraging datacasting technology over a low-cost satellite constellation, Outernet is able to bypass censorship, ensure privacy, and offer a universally-accessible information service at no cost to global citizens.
February 5, 2014
Target Breach Update
Hackers gained access to Target POS systems using login credentials belonging to an HVAC company.
November 6, 2013
Barracuda Networks IPO
After Barracuda IPO, CEO BJ Jenkins seeks $1 billion in sales. "It's been 10 years since the company was founded, we have 150,000 customers and we've been a consistent grower with good cash flows."
October 28, 2013
Vicarious AI breaks CAPTCHA ‘Turing test’
A startup developing artificial intelligence software announced that its algorithms can now reliably solve modern CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart).
October 1, 2013
Untangle Acquires Cymphonix
Cymphonix products will continue to be developed, marketed and sold by Cymphonix. Quick analysis: Cymphonix had the technology, Untangle had the cash. The combination should prove beneficial.
September 5, 2013
NSA Able to Foil Basic Safeguards of Privacy on Web
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications... (source: NY Times)
September 5, 2013
Anonymity-based Tor Platform has Security Issues
Georgetown University and the US Naval Research Laboratory (USNRL) has revealed that users of Tor ... may be “far more susceptible to compromise” than originally thought.
May 20, 2013
Websense to be Acquired by Vista Equity Partners
Upon closing, Websense will become a privately held company. Websense senior management is expected to continue with the company and its headquarters are expected to remain in San Diego.
March 27, 2013
Web slows under 'biggest attack ever'
Millions of people around the world have been affected by slow internet speeds after an unprecedented attack. ... At one point, 300 billion bits per second were being sent by a network of computers, making this the biggest attack ever.
January 10, 2013
IP Traffic in North America is Growing at a CAGR of 22 Percent
This white paper, entitled "The Zettabyte Era", presents some of the main findings of Cisco’s global IP traffic forecast and explores the implications of IP traffic growth.
November 29, 2012
Single Porn Site Accounts for 2% of All Internet Traffic
Xvideos, the largest porn site on the web with 4.4 billion page views per month, is three times the size of CNN or ESPN, and twice the size of Reddit. LiveJasmin isn’t much smaller. YouPorn, Tube8, and Pornhub — they’re all vast, vast sites that dwarf almost everything except the Googles and Facebooks of the internet.
August 23, 2012
Google to Merge Postini Email Security Services Into Google Apps Five years after Google bought Postini, the company is changing how it will deliver the email security services to customers.
May 31, 2012
Sal Khan’s ‘Academy’ Sparks a Tech Revolution in Education
Salman Khan’s simply narrated, faceless home videos on everything from algebra to French history have been viewed half a billion times.
April 17, 2012
Cymphonix Releases New LX Line with ZERO Per-User Charges
In response to rapidly growing investments that SMBs and educational organizations are making in Internet-based IT and operational systems, Cymphonix announced today the launch of their latest Internet Management offering, Network Composer LX.
April 13, 2012
Cymphonix Announces New Leadership
Leading the charge to deliver best-of-service Internet Management solutions, Cymphonix Corporation announced today a change in leadership as the company’s founders take on the positions of CEO, COO and Board Member.
March 06, 2012
Trustwave to Acquire M86 Security
Trustwave, a leading provider of cloud-based compliance and information security solutions, today announced it has signed a definitive agreement to acquire M86 Security, a global leader in Web security solutions and advanced anti-malware technology.
February 13, 2012
Blue Coat Shareholders Approve Merger Agreement with Thoma Bravo
Blue Coat shareholders voted to approve the previously announced merger agreement entered into on December 8, 2011 between Blue Coat and an investor group led by private equity investment firm Thoma Bravo, LLC.
February 1, 2012
Group1 Launches New “SoS” for Internet Filtering
Group1 today launched its new online SoS “Stay or Switch” service, designed to help the growing number of Internet filtering customers unhappy with their current product's performance, support or price.
January 19, 2012
SEC Push May Yield New Disclosures of Company Cyber Attacks
Over the next three months, investors may see new admissions of corporate networks being hacked after the SEC said companies can’t continue to hold back the details of those incidents.
January 12, 2012 M86 Recognized for Technology and Product Leadership
Dozens of awards honor company for innovative technology, Secure Web Gateway market leadership and channel commitment.
January 8, 2012 FBI Warns of Malware Phising Scam
Information on new Internet blight called Gameover
January 5, 2012
Internet Filtering: How Much is Too Much; How Little is Too Little?
Informative article posted by IT Director for several K-12 schools. Discusses federal CIPA mandate and argument for creating a strong AUP for both staff and students.