Latest Blog Posts

03b2ceb73723f8b53cd533e4fba898ee

Microsoft Observed a Significant Increase in Macros-Based Malware

January 05, 2015 Added by:Pierluigi Paganini

The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread their malicious code.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Treasury Imposes Sanctions Against the Government of The Democratic People’s Republic Of Korea

January 02, 2015 Added by:InfosecIsland News

In response to the Government of the Democratic People’s Republic of Korea’s numerous provocations, particularly the recent cyber-attack targeting Sony Pictures Entertainment and the threats against movie theaters and moviegoers, President Obama today signed an Executive Order (E.O.) authorizing the imposition of sanctions against the Government of North Korea and the Workers’ Party of Korea...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Addressing Mobile Risks in 2015

January 01, 2015 Added by:Rebecca Herold

We are literally putting more responsibility for the security of our business assets into the hands of our employees.

Comments  (1)

Ab28a67c637101abd994329b9bf494e8

Eat. Pray. Love. – Three Words that Comply with Sony’s Password Policy

January 01, 2015 Added by:Scott Garber

While evaluating the Sony hack and explosion of related press, our team discovered an eerie tie-in to the titles and taglines in Sony Pictures massive movie library, which might have been an early indicator of the inevitable breach.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Hacking 4G USB modems and SIM Card via SMS

December 31, 2014 Added by:Pierluigi Paganini

A group of experts managed to uncover USB modem vulnerabilities that allow a potential attacker to gain full control of the connected system.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

3 New Year’s Resolutions for Network Administrators

December 31, 2014 Added by:Patrick Oliver Graf

Although it’s been a historically troubling year for the cybersecurity community, the advantage of a new year is that network administrators can make a fresh start.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Right Security Framework For Your Small Business

December 30, 2014 Added by:Tripwire Inc

A great way to begin to secure your organization is to get a baseline of where you are now and set goals to improve your security stature.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Email Encryption Grew Tremendously, but Still Needs Work: 2014 in Review

December 30, 2014 Added by:Electronic Frontier Foundation

What if there were one thing we could do today to make it harder for the NSA and other intelligence agencies to eavesdrop on millions of people's email communications, without users having to change their habits at all?

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Compliance Is Getting More Rigorous

December 29, 2014 Added by:PCI Guru

When Visa and MasterCard trotted out their security standards back in 2002 and 2003, the large eCommerce merchants that got to see them complained that they were too much. Fast forward more than a decade and we still hear complaints that the PCI standards are too much.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

NSA Published Reports Containing Declassified Compliance Errors

December 29, 2014 Added by:Pierluigi Paganini

The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance.

Comments  (0)

0ead717779244d9aab5c1699308850d2

JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication

December 24, 2014 Added by:Brian Prince

A server that lacked two-factor authentication was the gateway hackers used to breach JPMorgan Chase this year, according to a report.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Hacking the Internet of Things: Beware of the Toasters

December 24, 2014 Added by:Tripwire Inc

In previous posts, we’ve discussed using refrigerators as literal bombs launched by catapults and fridges used as bots to execute denial-of-service attacks against hapless networks. But now, all that is small potatoes when you think about the rapid push towards the creation of the Internet of Things.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Forensic Examinations And Facts

December 23, 2014 Added by:PCI Guru

I am watching the news reports on the Sony breach and laughing at all of the “facts” that are being bandied about. I want to use the Sony breach as a teachable moment and explain that the “facts” may not be as factual as represented by the media, forensic examiners or even the FBI.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

The Holidays Bring Both Cheer and Fear to Network Administrators

December 23, 2014 Added by:Patrick Oliver Graf

Almost one year ago to the day, the “most wonderful time of the year” became anything but for millions of Americans when news of the Target data breach broke. Not only did that attack force us all to think twice about how our digital information is managed, it forever changed the network security landscape and put IT administrators in a perpetual state of high alert.

Comments  (1)

65be44ae7088566069cc3bef454174a7

Improve Information Security and Privacy Now!

December 22, 2014 Added by:Rebecca Herold

Too many businesses have poor information security controls in place (e.g,. demonstrably Sony, Staples, and a seemingly infinite number of other companies) and are basically giving their intellectual property, and the personal information they are responsible for, away.

Comments  (3)

201d6e4b7cd0350a1a9ef6e856e28341

Aurora and DHS - a Misleading Response to a Significant Mistake

December 22, 2014 Added by:Joe Weiss

With all of the focus on cyber security one could expect that DHS is doing a credible job in helping to protect our country. Unfortunately, that may not be the case.

Comments  (1)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »