Latest Blog Posts
February 19, 2015 Added by:Electronic Frontier Foundation
There's been some discussion about whether all copies of Superfish use the same root key to perform the MITM attacks
February 18, 2015 Added by:Eduard Kovacs
According to Hector Marco, a Spain-based security researcher, an attacker can remotely launch a denial-of-service (DoS) attack against a user by sending them a specially crafted email.
February 18, 2015 Added by:Patrick Oliver Graf
For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices around every corner.
February 18, 2015 Added by:Joe Weiss
Just like the SCADA system affected during the 2003 Northeast Outage had known software issues, DC Metro was aware its computers and fan ventilation systems for dealing with smoke in tunnels needed to be modernized.
February 18, 2015 Added by:Robert McNutt
While no one has a crystal ball to peer in and see what 2015’s landscape will look like, one thing is for sure: hackers are becoming more sophisticated and in order to stave off data breaches, we need to be aggregating and sharing information.
February 17, 2015 Added by:Brian Prince
According to a survey of 1,000 consumers by ResearchNow, a third of the IT professionals and administrators said they had downloaded an application they were not authorized to use on a corporate device in order to do their job.
February 17, 2015 Added by:Tripwire Inc
Like any other major initiative, especially a new corporate wide initiative, you need the voice of the CEO.
February 17, 2015 Added by:Anthony M. Freed
ISACA has released a new guide for organizations concerned about the impact of The Internet of Everything (IOT) on business operations, addressing the potential value and the associated risks involved with expanded connectivity.
February 16, 2015 Added by:Eduard Kovacs
A new report published by Alcatel-Lucent’s Motive Security Labs estimates that 16 million mobile devices were infected with malware in 2014.
February 13, 2015 Added by:InfosecIsland News
The PCI Security Standards Council applauds the progress made by The White House Cybersecurity Summit at Stanford University.
February 12, 2015 Added by:Brian Prince
In 2014, while several major companies were coping with breaches of their PoS infrastructure, many smaller retailers were facing the same threat from less-organized groups.
February 12, 2015 Added by:Mike Jawetz
If reactionary management of risk is inefficient and impulsive, why do most of us still do it?
February 12, 2015 Added by:InfosecIsland News
Please join Virtustream and SecurityWeek on Wednesday, Feb. 18th at 1PM ET for a live webcast on enterprise security trends.