Latest Posts


Department of Defense Reveals New Cyber Strategy

April 25, 2015 Added by:Mike Lennon

The U.S. Department of Defense (DoD) on Thursday unveiled its latest cyber strategy, described as a way to guide the development of DoD's cyber forces and strengthen its cyber defense and cyber deterrence posture.

Comments  (0)


Pushdo Spamming Botnet Still Active in the Wild

April 23, 2015 Added by:Pierluigi Paganini

Security experts at the Fidelis Cybersecurity firm have discovered a new variant of the Pushdo spamming botnet, which infected machines in more than 50 countries worldwide.

Comments  (0)


CozyDuke APT Behind White House, State Department Attacks: Kaspersky

April 23, 2015 Added by:Eduard Kovacs

According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.

Comments  (0)


Security of Internet of Things in Spotlight at RSA Conference

April 22, 2015 Added by:Brian Prince

The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.

Comments  (0)


Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)


How to Protect Yourself From Caller ID Spoofing

April 22, 2015 Added by:Tripwire Inc

Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.

Comments  (0)


The Changing Role of the CISO

April 21, 2015 Added by:Peter Zavlaris

The number of security breaches that have occurred over the last year and a half is unprecedented and has demonstrated a requirement for stronger security. The improvements needed to be made from within will stem from the CISO’s desk. This represents a shift that will require enterprises to re-examine the role of the CISO.

Comments  (0)


Apple Failed to Properly Fix “Rootpipe” Bug in OS X: Researchers

April 21, 2015 Added by:Eduard Kovacs

Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.

Comments  (0)


Why Requirement 5 Must Change

April 21, 2015 Added by:PCI Guru

The issue is the ineffectiveness of anti-virus solutions and why they are ineffective.

Comments  (0)


Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)