DDoS attacks typically flood web servers with traffic to take them down and so-called ‘stressers' sell those attacks as a service, offering to take down customers' selected targets for a fee or providing direct access to a DDoS tool. According to investigators working on Operation Power Off, DDoS hits emanating from webstresser.org targeted banks, government institutions, police forces, schools and the gaming industry, investigators said.

Take Down of World’s Biggest ‘DDoS-For-Hire’ Site (Learn More, Video)

The administrators of the DDoS marketplace webstresser.org were arrested on 24 April 2018 as a result of Operation Power Off, a complex investigation led by the Dutch National High Tech Crime Unit and the...

NCL Cyber Education Competition Empowers Students to Reach High

From students to teachers, the benefits of participating in the National Cyber League (NCL) cybersecurity competition runs a wide gamut, and every season more people are realizing the appeal. Its virtual training ground helps...

Homeland Security: Top Cyber Risks are Mobile Apps & Users (See Video)

By Hillary Vaughn, Fox Business  Most mobile app users blindly trust that the apps they download from app stores are safe and secure. But that isn’t the case. Douglas Maughan, who heads up...
Drive threat prevention to unmatched levels. The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Deep learning makes Intercept X smarter, more scalable, and higher performing than security solutions that use traditional machine learning or signature-based detection alone.

“The Dirty Secrets of Network Firewalls,” from Sophos (Multi-Video)

Sophos has announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45% of their organization’s network traffic. In fact, nearly one-in-four cannot...
Vincent Ramos, CEO of Canada-based Phantom Secure & four associates were indicted on charges that they knowingly and intentionally participated in a criminal enterprise that facilitated the importation & distribution of narcotics through the sale & service of encrypted communications to evade law enforcement and obstruct justice while committing transnational drug trafficking.

Phantom Secure Takedown: Selling Unhackable Phones to Drug Cartels

Phantom Secure Helped Drug Traffickers, Organized Crime Worldwide International organized crime and drug trafficking groups were dealt a blow by the takedown of an encrypted communication service they used to plan and...
The Veridium Authenticator App lets employees capture and authenticate using their biometrics – face, native fingerprint, and 4 Fingers TouchlessID – on their mobile devices, eliminating the need for passwords and tokens.

Veridium Eliminates Need for Passwords with New Biometric App

Authentication solutions firm Veridium, is introducing Veridium Authenticator App, an enterprise-ready solution enabling a cost-efficient, convenient and more secure multi-factor authentication process. The app is now available for download on any iOS and Android...
Fake users on online social networks can jeopardize your safety both in the online world and in the real world.

Algorithm Locates Fake Users Making Social Networks Safer (See Video)

Millions of us post on Facebook, send a tweet, or upload photos on online social networks. But how safe is the information we share? For that matter, how much information do we...
RSAC 2018 USA

DHS Nielsen & More with RSAC on Demand & Visit ‘ASTORS’ Winners

Secretary of Homeland Security Kirstjen M. Nielsen spoke at the 2018 RSA Conference to lay out the Department of Homeland Security’s cybersecurity priorities and policies in addition to addressing the cyber...
Mobile Security R&D Program Guide Vol. 2 (Courtesy of DHS S&T)

Check Out DHS S&T’s New Mobile Security R&D Program Guide Vol. 2

Mobile devices have revolutionized the way we do work, enabling on-demand access to services and information anytime from anywhere. In the United States, there are an estimated 200 million smart mobile devices and two...
Leader in deception-based cyber security expands its award-winning platform to proactively prepare and prevent advanced attacks.

Illusive Networks New Breakthrough in Attack Surface Reduction: ASM

Illusive Networks, a leader in deception-based cybersecurity solutions and a Competitor in the 2018 'ASTORS' Homeland Security Awards Program, has announced Attack Surface Manager (ASM), the first automated solution to continually reduce...