Latest Blog Posts
January 05, 2015 Added by:Pierluigi Paganini
The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread their malicious code.
January 02, 2015 Added by:InfosecIsland News
In response to the Government of the Democratic People’s Republic of Korea’s numerous provocations, particularly the recent cyber-attack targeting Sony Pictures Entertainment and the threats against movie theaters and moviegoers, President Obama today signed an Executive Order (E.O.) authorizing the imposition of sanctions against the Government of North Korea and the Workers’ Party of Korea...
January 01, 2015 Added by:Scott Garber
While evaluating the Sony hack and explosion of related press, our team discovered an eerie tie-in to the titles and taglines in Sony Pictures massive movie library, which might have been an early indicator of the inevitable breach.
December 31, 2014 Added by:Patrick Oliver Graf
Although it’s been a historically troubling year for the cybersecurity community, the advantage of a new year is that network administrators can make a fresh start.
December 30, 2014 Added by:Tripwire Inc
A great way to begin to secure your organization is to get a baseline of where you are now and set goals to improve your security stature.
December 30, 2014 Added by:Electronic Frontier Foundation
What if there were one thing we could do today to make it harder for the NSA and other intelligence agencies to eavesdrop on millions of people's email communications, without users having to change their habits at all?
December 29, 2014 Added by:PCI Guru
When Visa and MasterCard trotted out their security standards back in 2002 and 2003, the large eCommerce merchants that got to see them complained that they were too much. Fast forward more than a decade and we still hear complaints that the PCI standards are too much.
December 29, 2014 Added by:Pierluigi Paganini
The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance.
December 24, 2014 Added by:Brian Prince
A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.
December 24, 2014 Added by:Tripwire Inc
In previous posts, we’ve discussed using refrigerators as literal bombs launched by catapults and fridges used as bots to execute denial-of-service attacks against hapless networks. But now, all that is small potatoes when you think about the rapid push towards the creation of the Internet of Things.
December 23, 2014 Added by:PCI Guru
I am watching the news reports on the Sony breach and laughing at all of the “facts” that are being bandied about. I want to use the Sony breach as a teachable moment and explain that the “facts” may not be as factual as represented by the media, forensic examiners or even the FBI.
December 23, 2014 Added by:Patrick Oliver Graf
Almost one year ago to the day, the “most wonderful time of the year” became anything but for millions of Americans when news of the Target data breach broke. Not only did that attack force us all to think twice about how our digital information is managed, it forever changed the network security landscape and put IT administrators in a perpetual state of high alert.
December 22, 2014 Added by:Rebecca Herold
Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.
December 22, 2014 Added by:Joe Weiss
With all of the focus on cyber security one could expect that DHS is doing a credible job in helping to protect our country. Unfortunately, that may not be the case.