Contestants set up honeypots and spoof existing robocall-screening technologies.
Month: August 2014
An average of 7,000 attacks continue to seek out servers vulnerable to the bug.
Suspected reprisal for US sanctions resulted in gigabytes of stolen account data.
In May, we wrote about the breach discovery gap, which is the time it takes IT security practitioners to discover a data breach after their systems have been compromised in a cyberattack. We made t