Latest Posts

E595c1d49bf4a26f8e14ce59812af80e

What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Top 10 Phishing Attacks of 2014

December 16, 2014 Added by:Ronnie Tokazowski

While attackers are loading up their phishing emails with new malware all the time, the majority of their phishing emails use stale, recycled content.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Debunking The Biggest Cyber Security Myths for Businesses

December 16, 2014 Added by:Tripwire Inc

A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation.

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

How To Exit an MSSP Relationship?

December 15, 2014 Added by:Anton Chuvakin

Let me touch a painful question: when to leave your managed security services provider?

Comments  (0)

65be44ae7088566069cc3bef454174a7

The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

December 12, 2014 Added by:InfosecIsland News

Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Depends

December 11, 2014 Added by:Wendy Nather

I've always had a problem with compliance, for a very simple reason: compliance is generally a binary state, whereas the real world is not. Nobody wants to hear that you're a "little bit compliant," and yet that's what most of us are.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Security Backdoors are Bad News—But Some Lawmakers Are Taking Action to Close Them

December 11, 2014 Added by:Electronic Frontier Foundation

As many privacy advocates have pointed out recently, it looks like some people in the federal government are intent on reviving the failed Crypto Wars of the 90s.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

POODLE Redux: Now Affecting Some TLS Implementations

December 10, 2014 Added by:Tripwire Inc

Although vendors of tools that were vulnerable to the flaw quickly fixed their systems to rely on TLS vs SSL v3, a problem still exists due to TLS padding being a subset of SSLv3’s so that decoding functions for SSLv3 can be used with TLS, as well.

Comments  (0)