Cybereye

CyberEye

  • SEA

    Syrian Electronic Army's attacks expose the Internet's weak links

    The attacks being used by pro-Assad hacktivists are not new, but they demonstrate the ability of bad guys to exploit the Internet's ecosystem.

    Comments: 1
  • outsource

    Outsourcing cybersecurity? Feds get behind the idea.

    DHS' Continuous Diagnostic and Mitigation program is the latest step in a trend toward holistic security that puts it into the hands of experts.

    Comments: 5
  • Businessman with laptop concerned by IPv6 Ping of Death

    Microsoft issues fix for resurrected Ping of Death

    The vulnerability, an IPv6 version of a flaw that was fixed more than a decade ago, is one more reason to be aware of the IPv6 traffic agency networks.

    Comments: 1
  • owls

    Threat-info sharing: Still broken after all these years

    Despite a consensus that information sharing is critical to cybersecurity, organizations still hold onto their information, allowing serious threats to flourish for years after they become known.

  • Black Hat

    Mobile threats and other new directions from Black Hat

    Mobile computing seems to be the new frontier of cybersecurity, but identifying new trends at the Black Hat Briefings is more difficult as the conference grows and becomes more inclusive.

  • People standing in line in Las Vegas using insecure WiFi

    Secure-travel advice for Black Hat... and your local Starbucks

    The annual Black Hat USA security conference is not exactly hostile, but you’ll run into a lot of people who pride themselves on their hacking skills.

  • Two men checking mobile phones with giant rat looking over their shoulders

    AndroRAT signals commercialization of mobile malware

    Mobile malware is not new, but a new tool in the cyber crime underground could ultimately pave the way for hackers to leverage malware in large mobile botnets.

    Comments: 2
  • Broken window showing poster of generic top level domain names

    New domain names bound for collisions: 'Things are going to break'

    Concerns persist that new generic Top Level Domains being approved for the Internet could conflict with internal naming schemes, disrupting networks with naming collisions.

    Comments: 1
  • Man sitting on floor behind a pillar making a mobile call

    Boom times for mobile security

    Concerns about privacy, spying and leaks are creating demand for products and services that encrypt and protect mobile communications, and smart phones have the processing power to handle it.

    Comments: 1
  • Two people use two separate keys to open bank deposit box

    Can the two-man rule foil insider threats?

    The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.

    Comments: 4