NSA whistleblower Edward Snowden spent a week in New Delhi, training in advanced ethical hacking, where he earned his certification as an EC-Council Certified Security Analyst.
High -20 °C, Low -24 °C, P.O.P. 30%
High -22 °C, Low -28 °C, P.O.P. 20%
High -21 °C, Low -30 °C, P.O.P. 20%
-18 °C , Humidity 77% , Wind NW 11km/h
An interim report into the release of the email metadata and content of communications by New Zealand MP Peter Dunne, Parliamentary staff and a journalist finds failings in a new IT system servicing both the Executive and Parliament.
Conventional information security falls down when it comes to spotting fishy activities inside the system. That's why it will eventually be replaced by real-time big-data technology, says machine-learning firm Darktrace.
In the closing days of their Kickstarter, Perihelion Interactive were able to reach their funding goal.
An Iranian news agency says that a new worm more powerful than Stuxnet is being developed to disrupt the country's nuclear program.
Government says it plans to ask the U.S. how it can decrypt data sent over messaging services such as WhatsApp and Viber, and complain about the lack of cooperation from U.S. service providers in aiding its cybercrime investigations.
CCP Rise recently wrote on the EVE-O forum the following presentation for the new Sisters of EVE Battleship. I am very relieved to finally show you the Sisters of EVE Battleship, the Nestor. We weren’t able to get it finalized before Rubicon went out, but that’s alright because now it makes a nice Christmas present […]
Hello everybody, my name is CCP Prism X and I am a Libra! This summer we saw a welcome influx of players with the release of EVE Online: Odyssey. On occasions as such we usually celebrate our great success by pulling out the champagne and our $1000 Japanese pants, and having ourselves a great big […]
Jester wrote a very interesting piece on RMT. In short: while trading ISK for $ is forbidden, trading ISK for services is not, it’s actually supported by devs and can be carried out on the official forum instead of some shady site. Of course CCP cannot see if there was another transaction: the service for […]
Attorney-General George Brandis has backed Prime Minister Tony Abbott's description of metadata as "essentially billing data" as a perfectly accurate shorthand description for a debatable term.
The last few days have seen RUS/CFC blocks fail by hours and sometimes minutes to capture systems in their latest offensive. After the defeats detailed in my previous two articles the Russians decided to hit the systems of XVV and DY- near the N3 staging systems of GXK and I-N. These two systems saw RUS/CFC […]
Everyone knows storyline modules are awful. Everyone except Prof Lebedinskiy.
Amazon Inc. is currently working on a drone delivery system for their urban distribution centres.
Hackers, hacktivists and cyber-warriors all hit the headlines in 2013, and will undoubtedly do so again in 2014. Here's an analysis of what the experts at seven security vendors think will happen in the coming year.
Businesses constantly fail to identify risks at the board level or implement the right security measures. But where does the breakdown occur, and how can other organisations avoid making the same mistakes?
More sophisticated, targeted attacks on Asia-based firms should drive the evolution of internal culture and processes to combat such threats. There are significant hurdles to overcome, however, and the cyberthreat landscape remains fundamentally global.