Latest Blog Posts

B64e021126c832bb29ec9fa988155eaf

Hackers Impersonating Feds buy $1.5 Million worth of PC Supplies

April 07, 2014 Added by:Dan Dieterle

“Spear phishing fraud” has been used by hackers impersonating federal entities to create fraudulent orders for large amounts of PC supplies including toners, ink cartridges and even laptops.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Yahoo Protects Users with Lots More Encryption

April 03, 2014 Added by:Electronic Frontier Foundation

We were thrilled to hear today that Yahoo is carrying through a concerted effort to protect users across its sites and services by rolling out routine encryption in several parts of its infrastructure

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

On Complexity & Bureaucracy vs Security…

April 02, 2014 Added by:Brent Huston

“Things have always been done this way.” —> Doesn’t mean they will be done that way in the future, or even that this is a good way.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Tesla Cars Hackable – Protected by 6 character Password

April 02, 2014 Added by:Dan Dieterle

Black Hat Asia presenter and security researcher Nitesh Dhanjani explained last week that the car could be locked and unlocked by cracking a short password.

Comments  (0)

Fafdf1720f4df1d41c6eacbd2429a06b

Remote Desktop’s Restricted Admin: Is the Cure Worse Than the Disease?

April 01, 2014 Added by:Tal Be'ery

One of the new security features in the latest Windows release (Windows 8.1) is the “Restricted Admin mode for Remote Desktop Connection”. This measure is meant to enhance Windows credential protection against attacks such as Pass-the-Hash and Pass-the-Ticket. However, it appears that cure might be worse than the disease as the new “Restricted Admin mode” opens a new attack surface for the...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Full Disclosure: The Rebirth

March 31, 2014 Added by:Tripwire Inc

Today, Full Disclosure is alive again, the advisories are flowing, the banter is cheerful, and the trolling has already started.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Reforming Terms of Service: Microsoft Changes Its Policy on Access to User Data

March 31, 2014 Added by:Electronic Frontier Foundation

We commend Microsoft for its willingness to reconsider its policies, and we think it made the right decision.

Comments  (0)

B742830daed9314883a0edc63daefc42

Pros and Cons of US-Based Cloud Services

March 31, 2014 Added by:Gilad Parann-Nissany

Any company or individual using cloud services today should encrypt data in addition to their firewall, anti-virus and other security measures. Incidentally, it is also encouraged by regulation in several sensitive sectors, notably businesses in the health industry under HIPAA patient and data privacy laws and the payment card industry under PCI DSS standards.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

We Have to Find Ways to Reinforce Trust

March 29, 2014 Added by:Jarno Limnéll

We are losing the battle for cyberspace. Not because malicious actors are taking over the digital world, but because we are forgetting what is the element that makes us feel safe and secure in any world: the ability to trust.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Be Wary: Hackers are Readying Security Updates for XP Users

March 27, 2014 Added by:Tripwire Inc

Approximately 40% of PC users still run desktop versions of Windows XP as well. Windows XP has been regarded by many as the best version of Windows ever.

Comments  (0)

21bc599fa4dd7ac5d5367f4398458adc

When Security Tools Cry Wolf

March 27, 2014 Added by:Ken Westin

With the rising number and complexity of security tools at our fingertips, sometimes everything looks like an alert so nothing becomes actionable.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

The Power of Change

March 26, 2014 Added by:Wendy Nather

I believe that most of security relies on detecting and controlling change. And there are so many aspects to change that have to be considered.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

How to Use Threat Intelligence with Your SIEM?

March 26, 2014 Added by:Anton Chuvakin

SIEM and Threat Intelligence (TI) feeds are a marriage made in heaven! Indeed, every SIEM user should send technical TI feeds into their SIEM tool.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Will the Demise of XP Shut Down Your Business…or Heart?

March 25, 2014 Added by:Rebecca Herold

According to NetMarketShare at the end of February, 2014, 30% of all folks using Windows desktop computers were still running Windows XP.

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

Missing the (opportunity of) Target

March 25, 2014 Added by:Jack Daniel

What we have is an opportunity to make customers and some merchants happier by standardizing technology across the globe - and we could slide a little increase in security into the process at the same time.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Microsoft Says: Come Back with a Warrant, Unless You’re Microsoft

March 24, 2014 Added by:Electronic Frontier Foundation

The search in the Kibkalo case may have revealed criminal activity, but it was also conducted in Microsoft’s self-interest, which is an exceedingly dangerous precedent.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »