Latest Blog Posts

Af7244bb99debb4a1152fa49a993a05c

New PoS Malware Used to Target Interactive Kiosks

November 27, 2014 Added by:Eduard Kovacs

A new piece of malware designed to steal data from point-of-sale (PoS) terminals has been found on electronic kiosks, including on public transport ticket vending machines, IntelCrawler reported on Wednesday.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

The Three Human Failures Behind Remote Access Shortcomings

November 26, 2014 Added by:Patrick Oliver Graf

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.

Comments  (2)

Fb2ec53c17a3a96651244839dabd6ec8

Data Classification for a Stronger Security Outlook

November 26, 2014 Added by:Steve Martino

While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (2)

65be44ae7088566069cc3bef454174a7

You Need to Know About Ransomware

November 25, 2014 Added by:Rebecca Herold

As more crooks see how much money their buddies are making, you will see more and more types of ransomware being launched, putting you and your business at risk if you are not on the lookout for the signs of such a crime.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Avoiding the Bait: Helpful Tips to Protect Yourself Against Phishing Scams

November 24, 2014 Added by:Tripwire Inc

Phishing scams come in all shapes and sizes. But one thing is for certain: they are all around us.

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Face It, You Are A Poor Judge Of Risk

November 24, 2014 Added by:PCI Guru

I bring this up because the PCI DSS is heading more and more to be driven by risk and the assessment of that risk.

Comments  (5)

Fc152e73692bc3c934d248f639d9e963

Security or Checking a Box?

November 20, 2014 Added by:PCI Guru

What is your organization interested in? Security or checking a box? Not surprisingly, most people answer “security” and then go on to prove with their actions and words that they are only interested in checking a box.

Comments  (1)

B689dd1362bef7eb372a540d3b6e6287

Access Governance 101: Job Changes and Elevated Permissions

November 20, 2014 Added by:Identropy

Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Operation Onymous Challenges Tor to Strengthen Its Security

November 19, 2014 Added by:Tripwire Inc

Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Centralization: The Hidden Trap

November 19, 2014 Added by:Brent Huston

What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Launching in 2015: A Certificate Authority to Encrypt the Entire Web

November 18, 2014 Added by:Electronic Frontier Foundation

Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Cyber Threats in 2015: New Attack Vectors, More Severe Incidents

November 18, 2014 Added by:Patrick Oliver Graf

One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

MSSP Client Onboarding – A Critical Process!

November 17, 2014 Added by:Anton Chuvakin

Many MSSP relationships are doomed at the on-boarding stage when the organization first becomes a customer.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Arrogance of the US Nuclear Power Industry - We Don't Want to Look at Everything

November 17, 2014 Added by:Joe Weiss

In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »