Latest Blog Posts
May 05, 2015 Added by:Anthony M. Freed
The newly released Internet Security Threat Report (ISTR) – which examines emerging trends in attacks, malicious code activity, phishing, and spam – reveals that 2014 was a record-setting year for the exploitation of zero-day vulnerabilities, and it took software companies an average of 59 days to implement patches, up from only four days in 2013.
May 04, 2015 Added by:Tripwire Inc
Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get used to it.
April 30, 2015 Added by:Eduard Kovacs
Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.
April 30, 2015 Added by:Tripwire Inc
Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.
April 30, 2015 Added by:InfosecIsland News
The Payments Security Task Force joined with the PCI Security Standards Council and the EMV Migration Forum to launch a chip education curriculum and “pre-qualification” program to help streamline and simplify the EMV testing and certification process for Value Added Resellers and Independent Software Vendors.
April 30, 2015 Added by:Malwarebytes
The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.
April 29, 2015 Added by:Anthony M. Freed
The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.
April 29, 2015 Added by:Anup Ghosh
We know that change is hard to implement in organizations. But we also know that doing the same thing over and again and expecting a different result is Einstein’s definition of insanity.
April 28, 2015 Added by:Peter Zavlaris
The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.
April 28, 2015 Added by:Eduard Kovacs
The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.
April 28, 2015 Added by:Robert Vamosi
Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.