Latest Posts

306708aaf995cf6a77d3083885b60907

Department of Defense Reveals New Cyber Strategy

April 25, 2015 Added by:Mike Lennon

The U.S. Department of Defense (DoD) on Thursday unveiled its latest cyber strategy, described as a way to guide the development of DoD's cyber forces and strengthen its cyber defense and cyber deterrence posture.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Pushdo Spamming Botnet Still Active in the Wild

April 23, 2015 Added by:Pierluigi Paganini

Security experts at the Fidelis Cybersecurity firm have discovered a new variant of the Pushdo spamming botnet, which infected machines in more than 50 countries worldwide.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

CozyDuke APT Behind White House, State Department Attacks: Kaspersky

April 23, 2015 Added by:Eduard Kovacs

According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security of Internet of Things in Spotlight at RSA Conference

April 22, 2015 Added by:Brian Prince

The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

How to Protect Yourself From Caller ID Spoofing

April 22, 2015 Added by:Tripwire Inc

Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

The Changing Role of the CISO

April 21, 2015 Added by:Peter Zavlaris

The number of security breaches that have occurred over the last year and a half is unprecedented and has demonstrated a requirement for stronger security. The improvements needed to be made from within will stem from the CISO’s desk. This represents a shift that will require enterprises to re-examine the role of the CISO.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Apple Failed to Properly Fix “Rootpipe” Bug in OS X: Researchers

April 21, 2015 Added by:Eduard Kovacs

Apple’s recent fix for the OS X privilege escalation vulnerability dubbed “rootpipe” isn’t effective, according to researchers.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Why Requirement 5 Must Change

April 21, 2015 Added by:PCI Guru

The issue is the ineffectiveness of anti-virus solutions and why they are ineffective.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)