Latest Blog Posts

Adc7bc93d49867e98bdd5ec1617f4e32

Steam Patches Crypto Code to Prevent Padding Oracle Attacks

May 03, 2016 Added by:Ionut Arghire

Steam recently patched security vulnerabilities in its system to prevent attackers from tapping into the data transmitted between a local client and the Steam network to view plain-text passwords or take over accounts.

Comments  (0)

37b77b2d6c99c432123b1b46fa64e566

The Role of CASBs in Protection Against the 2016 “Treacherous 12"

May 03, 2016 Added by:Ganesh Kirti

We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

End-to-end Encryption, Today -- Loophole Closed or Moved?

April 22, 2016 Added by:Vanishree Rao

End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Access Management Increases Security, Cuts Costs

April 22, 2016 Added by:Dean Wiech

While IT spending may be cut back, investments in identity and access management (IAM) solutions continue to grow because of security issues, flexibility and an overall cost savings.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Nuclear Exploit Kit Targets Non-English Users in Over 150 Countries

April 21, 2016 Added by:Ionut Arghire

Researchers at Cisco Talos have recently had a closer look at Nuclear and noticed that its operators have switched focus toward non-English users, but that they are targeting people in more than 10,000 different cities in over 150 countries worldwide.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

5af5a92f9548968dc33daa522c823aa1

3 Requirements for Effective Security Investigations

April 15, 2016 Added by:Tomer Saban

In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

RockLoader Dropper Downloads Locky, Kegotip, and Pony

April 14, 2016 Added by:Ionut Arghire

A new malware downloader has been spotted recently, used to drop various malicious programs to compromised computers, including the Locky ransomware and the Kegotip and Pony info stealers.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes April 2016 - DoS Vulnerabilities on the Rise

April 14, 2016 Added by:Alexander Polyakov

SAP's April security patches resolve 26 vulnerabilities in SAP products, including 19 SAP Security Patch Day Notes and 7 Support Package Notes.

Comments  (0)

0691ab2a89db6dae5b9845dee3dd63a4

Cloud Email Applications Could Put Your Corporate Data at Risk

April 12, 2016 Added by:Yotam Gutman

Third party email cloud application could expose the organizations data since employees now have the ability to grant applications access to their corporate information

Comments  (0)

608fdf3ab6d2bd77e08ec9c2774d03d9

Adobe Flash Player Issues Offer Endpoint Lessons

April 12, 2016 Added by:Amir Geri

The vulnerabilities found in Flash Player have forced Adobe to issue out security patches yet again. Whether the decision is to uninstall Flash entirely or ensure that all updates have been completed across the enterprise, the issue IT practitioners face is related to compliance.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Encrypted Messaging App Signal Desktop Launches in Public Beta

April 11, 2016 Added by:Ionut Arghire

The Signal secure communication application is now available for all desktop users, after being available via an invitation program only for the past few months.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

"Cyber AIR" Act Would Direct FAA to Establish Cybersecurity Standards for Aircraft

April 08, 2016 Added by:InfosecIsland News

Senator Edward Markey (D-Mass.) has proposed the "Cyber AIR" Act, which would direct the FAA to establish cybersecurity standards for aircraft.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »