Before the advent of intrusion detection systems (IDS) and intrusion prevention systems (IPS), firewalls served as the primary technology to help organizations block unwanted traffic. With applicat
Month: January 2013
Contributor: Joseph Bingham
A few weeks ago, we observed a spear phishing campaign targeting groups in the aerospace and defense industry. We identified at least 12 different organi
Yesterday in Lille, the 5th CyberSecurity International Forum (FIC2013) ended with a speech by Manuel Valls, the French Minister of the Interior. Among the subjects, the Minister informed the audie
Apple has released iOS 6.1 for the iPhone 3 GS and later, iPod touch 4th generation and later, and iPad 2 and later to address multiple vulnerabilities. These vulnerabilities may allow an att