July 2015

Data Theft From Air-Gapped Computers Possible via Cellular Frequencies

A piece of malware and a basic cell phone are all you need in order to steal data from an air-gapped computer, according to researchers.
Air-gap security is often used by organizations to protect their most valuable assets. The technique involves isolating computers that store sensitive information from the Internet and even from the organization’s internal network.
read more

The Economics of Cybersecurity - Are Scales Tipped to the Attacker?

An argument can certainly be made that the economics of cybersecurity largely favor the attacker. While the takedown of Darkode was a win for the good guys, at least temporarily, the unfortunate reality is there remains a multitude of other underground forums where criminals can gain easy access to the tools and technical support needed to organize and execute an attack.

Pages

Advertisements