Latest Blog Posts

Ebb72d4bfba370aecb29bc7519c9dac2

Once More on Insta-Fail Security Policies – Rant Alert!

June 15, 2015 Added by:Anton Chuvakin

For a while, I was under impression that my deep disdain for “insta-FAIL security policies” (i.e. those written without any chance of ever being complied with, even during the policy-writing process) knows no equal.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Security 2020: What Direction is Cyberspace Heading?

June 15, 2015 Added by:Dan Lohrmann

By almost any measure, cyber danger doubled last year and hackers are now breaking into enterprise systems, stealing sensitive data and causing business disruption at an unprecedented pace.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Weak Remote Access Practices Contributed to Nearly All PoS Breaches: Trustwave

June 11, 2015 Added by:Brian Prince

It's not just hype - point-of-sale (PoS) systems are being compromised more than ever, and much of the blame falls on mistakes surrounding remote access.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Online Self-Policing: Check Yourself Before You Wreck Yourself

June 11, 2015 Added by:Lisa Huff

As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

UK Data Breaches Have Increased in Number, Scale and Cost, Reveals Study

June 11, 2015 Added by:Tripwire Inc

According to the 2015 Information Security Breaches Survey, the number of security breaches has increased in the past year, whereas the scale and cost have nearly doubled.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Several Hospira Drug Pumps Use Vulnerable Software: Researcher

June 10, 2015 Added by:Eduard Kovacs

A researcher who has analyzed the software installed on infusion pumps manufactured by Hospira says several models are plagued by the vulnerabilities disclosed earlier this year.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Forget About IOCs… Start Thinking About IOPs!

June 10, 2015 Added by:Ronnie Tokazowski

For those who may have lost track of time, it’s 2015, and phishing is still a thing. Hackers are breaking into networks, stealing millions of dollars, and the current state of the Internet is pretty grim.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Artificial Intelligence – Let’s Let Our Computers Guard Our Privacy For Us!

June 10, 2015 Added by:Brent Huston

More and more computer devices are designed to act like they are people, not machines.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Researchers Track Subway Rider’s Movements Through Mobile Phones

June 09, 2015 Added by:Anthony M. Freed

A team of Chinese researchers say they have devised a methodology to track the movements of subway riders through motion detectors that are standard features on most mobile phones.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Prioritizing Patch Management Critical to Security

June 09, 2015 Added by:Brian Prince

Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

IT Security: Evolving to a Risk-Based Approach

June 09, 2015 Added by:Tripwire Inc

For those involved with securing privileged information, the news of the latest big breach plastered on every TV, website and newspaper commonly elicits a pair of simultaneous reactions: relief that it’s not your organization and dread that it could be the next time.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Change Controls Are Still Necessary

June 08, 2015 Added by:Rebecca Herold

Over the years in the security classes I’ve taught, I’ve covered the importance of program change control management, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Another Day, Another Health Insurance Breach

June 08, 2015 Added by:Peter Zavlaris

Insurance companies, especially those in healthcare, continue to be prime targets for cybercrime.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Disrupting an Adware-serving Skype Botnet

June 08, 2015 Added by:Ronnie Tokazowski

In the early days of malware, we all remember analyzing samples of IRC botnets that were relatively simple, where the malware would connect to a random port running IRC, joining the botnet and waiting for commands from their leader. In this day and age, it’s slightly different.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Trust-Based Security Models Ineffective: Researchers

June 04, 2015 Added by:Eduard Kovacs

The trust-based foundations of whitelisting make it more difficult for organizations to properly protect their networks against cyber threats, Kaspersky Lab researchers have warned.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Tox: Free Ransomware Toolkit Hits the Black Market

June 04, 2015 Added by:Anthony M. Freed

Do-it-yourself malware toolkits have been available on the black market for a long time, but now researchers have discovered the first ransomware variation for creating your own extortion campaigns – and it’s free to use.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »