Joe Ferrara Top Priority Sector: education_training Image Caption: Joe Ferrara There’s been a lot of debate lately about whether or not cyber security training is worth the investment. To engage in this debate, it is important that all parties have a common definition of cyber security training. If we define…
ICE holds Nigerian admitting to using false ID to work at airport
Mark Rockwell Top Priority Sector: airport_aviation_security Image Caption: Newark Liberty A Nigerian man who admitted assuming the identity of a murder victim to get clearance to work as a private security guard at Newark Liberty International Airport is now in the custody of Immigration and Customs Enforcement. Bimbo Peter Oyewole,…
Security services among top employers IT students want to work for
MI5 and GCHQ are among the top 10 employers that IT students would like to work for, although the likes of Google and Apple still lead in the work popularity stakes. View full post on Techworld.com … View full post on National Cyber Security
SpywareLady: How do I learn to be a growth hacker? Work for one of the guys … http://t.co/5kJcK2Ui
SpywareLady: How do I learn to be a growth hacker? Work for one of the guys … http://t.co/5kJcK2Ui View full post on Twitter / SpywareLady View full post on National Cyber Security
PHP work on new patch for critical vulnerability after first one fails
The PHP Group plans to release new versions of the PHP processor on Tuesday in order to patch two publicly known critical remote code execution vulnerabilities, one of which was improperly addressed in a 3 May update. View full post on Techworld.com security View full post on National Cyber Security
Social Media Restrictions on the Rise, Facebook Use at Work on the Decline
Facebook usage in the workplace is down for the first quarter of 2012, according to a new report released by a firm that provides Web content filtering for companies. read more View full post on Security Management News & Analysis View full post on National Cyber Security
Online black markets and how they work
The internet is no stranger to crime. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an internet connection, but the whole…
PCI assessor and CISO: Work together for the best PCI ROC
In a session at the SOURCE Boston conference, a PCI assessor and a CISO explain that there are ways to arrive at a report on compliance they can both appreciate. View full post on SearchSecurity: Security Wire Daily News View full post on National Cyber Security
‘Police ransom’ Trojans the work of single Russian gang, Trend finds
The wave of ‘police Trojan’ ransomware that has hit PC users across the developed world in the last year is probably the work of a single highly-active Russian cybercrime gang, a forensic analysis by Trend Micro has concluded. First detected in 2011, there have been numerous police ransom attacks in…
How Malware Networks work and how to defend against them
<!– Sign up for our Newsletters | –> Sign up for our Newsletters | Email the Editor | Print In 2011, cybercriminals stepped up their game with the creation of malware networks (malnets)-distributed network infrastructures that exploit popular places on the Internet like search engines and social networking sites…