Latest Blog Posts

0ead717779244d9aab5c1699308850d2

Inside IaaS Security Challenges for Enterprises

May 05, 2015 Added by:Brian Prince

Infrastructure-as-a-service can provide an attractive option for businesses, but approaching security wrong can come with a cost all its own.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

This Carding Forum is Spamtacular

May 05, 2015 Added by:Malwarebytes

Credit card fraud is a huge problem, and by its very nature falls across the entire security spectrum.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Top Critical Skill In Information Security: Be Humble

May 04, 2015 Added by:Tripwire Inc

Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get used to it.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

By All Means, Do as Little as Possible

May 04, 2015 Added by:PCI Guru

I write this because I have had enough of arguing over the lowest common denominator when it comes to securing networks, servers and applications.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Flaws in WordPress eCommerce Plugin Expose Over 5,000 Websites

April 30, 2015 Added by:Eduard Kovacs

Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Four Most Common Evasive Techniques Used by Malware

April 30, 2015 Added by:Tripwire Inc

Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Payments Industry Moves to Help Simplify Chip Card Acceptance

April 30, 2015 Added by:InfosecIsland News

The Payments Security Task Force joined with the PCI Security Standards Council and the EMV Migration Forum to launch a chip education curriculum and “pre-qualification” program to help streamline and simplify the EMV testing and certification process for Value Added Resellers and Independent Software Vendors.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Password Alert for Chrome, and other Extensions

April 30, 2015 Added by:Malwarebytes

The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.

Comments  (0)

6d117b57d55f63febe392e40a478011f

New Vulnerabilities Identified in Network Time Protocol Daemon (NTPD)

April 29, 2015 Added by:Anthony M. Freed

The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.

Comments  (0)

B16fab97daa7df5ccd0d892c340b0541

Expecting to Get Hacked? A Strategy to Turn the Tide

April 29, 2015 Added by:Anup Ghosh

We know that change is hard to implement in organizations. But we also know that doing the same thing over and again and expecting a different result is Einstein’s definition of insanity.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Social Engineering: Attackers' Reliable Weapon

April 29, 2015 Added by:Brian Prince

Whatever the ploy, social engineering is the opening salvo in targeted attacks against organizations all over the world.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Hackers Tricked AT&T, Network Solutions Employees in Tesla Attack

April 28, 2015 Added by:Eduard Kovacs

The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

First Lose the “Cyber” – Then We Can Talk

April 28, 2015 Added by:Robert Vamosi

Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

How to Resolve the BYOD Stand-Off Between Employees and IT

April 28, 2015 Added by:Patrick Oliver Graf

Users want, and demand, access to a broad range of personal mobile devices in the workplace. They want to be able to safely access work files on their phones while on-the-go and work from their homes on their personal laptops.

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »