Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.
wikileaks - News, Features, and Slideshows
Information about purported CIA cyberattacks was "passed around" among members of the U.S. intelligence community and contractors before it was published by WikiLeaks this week, Julian Assange says.
WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products
WikiLeaks has released more than 8,700 documents it says come from the CIA's Center for Cyber Intelligence, with the documents saying the agency had 24 "weaponized" zero-day exploits for the Android operating system as of 2016.
WikiLeaks claims to have many thousands of sources but does not collaborate with states in the publication of documents, its editorial board said Sunday.
Technology professionals are among today's most infamous whistleblowers. The list of those who have made headlines for exposing corporate or government skulduggery includes Shawn Carpenter, a network security analyst who blew the lid off a Chinese cyberespionage ring; Bradley (now Chelsea) Manning, who shared more than 250,000 classified State Department cables with WikiLeaks; and Edward Snowden, who leaked top-secret information about NSA surveillance activities.
Companies including MITRE are looking at privileged access and how to better lock it down -- without stopping employees from doing their jobs.
It's been All WikiLeaks, All the Time here in Cringeville lately. And why not? As I noted last time out, this is the biggest thing to hit the WebberNets since Tim Berners Lee dreamed it up 20 years ago. We're still unraveling the implications and probably will continue to do so for months if not years.
It's not an exaggeration to say that the recent Wikileaks scandal has shaken the Internet to its core. Regardless of where you stand on the debate, various services have simply refused to handle Wikileaks' business -- everything from domain-name providers to payment services -- and this has led to many questioning how robust the Internet actually is.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
- CSO Webinar: Business Email Compromise | Head of Fraud Risk Strategy - ANZ Bank, Australian Centre for Cyber Security & more | Register now
- Emerging Cyber Threat Summit | Cybersecurity strategy for business leaders in the digital age | 6-8 June | Sydney | Get the agenda
- Translating Security Leadership into Board Value : Download Now
- Advanced endpoint protection test report : Download Now
- Security Exhibition & Conference | Intelligent Strategies for Australia’s Security Industry 26-28 July 2017 | ICC Sydney, Darling Harbour | Find out more
- Everything You Need to Know About Cyber Threats But Were Too Afraid To Ask: Download Now
- Network Professionals Survey with Computerworld Australia Enter this survey and you could WIN one (1) of two (2) Microsoft Surface Pro 4 128GB Tablet valued at AU$999 each. *Terms & Conditions Apply
- 22 Experts Share How to Communicate Security Program Effectiveness to Upper Management : Download Now