Top Stories

B8645aab12b6ba5e561fccefbf46cc0c

Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)

Latest Posts

B8645aab12b6ba5e561fccefbf46cc0c

Challenges and Solutions of Threat and Vulnerability Sharing in 2015

June 29, 2015 Added by:Shawn Masters

Overcoming the challenges that information sharing presents will require greater collaboration across the financial industry and a focus on combined efforts rather than individual protection

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Enterprises See 30 Percent Rise in Phone Fraud: Report

June 25, 2015 Added by:Eduard Kovacs

Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Elusive HanJuan EK Drops New Tinba Version (updated)

June 25, 2015 Added by:Malwarebytes

Dutch security firm Fox-IT has identified the payload as a new version of Tinba, a well-known banking piece of malware.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

VERT Vuln School: Return-Oriented Programming (ROP) 101

June 25, 2015 Added by:Tripwire Inc

In the beginning, there were stack buffer overflows everywhere.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Enable the Business? Sometimes Security Must Say “NO”…

June 25, 2015 Added by:Anton Chuvakin

As a security technologist you may be asked to do the impossible.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Researchers Demonstrate Stealing Encryption Keys Via Radio

June 24, 2015 Added by:Brian Prince

Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.

Comments  (0)

A70a600d7c593ca50cc6639cd64ed71a

Thoughts on the Active Defense Debate

June 24, 2015 Added by:Joseph Pizzo

Organizations large and small need to run a better defense and get better at securing their assets, only then should an attack response be considered.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Privacy Concerns Changing the Playing Field for Brands

June 24, 2015 Added by:Peter Zavlaris

New data suggests there are consequences for companies that don’t take their customers’ private information as seriously as the customers do.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Trouble In The Cloud?!

June 23, 2015 Added by:Anton Chuvakin

What challenges does the usage of traditional, on-premise security tools [monitoring tools, like SIEM or DLP, in particular] creates in the cloud [SaaS, PaaS, IaaS models]?

Comments  (0)