Latest Blog Posts

7d55c20d433dd60022642d3ab77b8efb

SAP Afaria: How to Wipe Mobile Devices Clean with One Text Message

February 11, 2016 Added by:Alexander Polyakov

SAP Afaria can be used for remote control of mobile devices and, with ClientID generated on the basis of IMEI, attackers can compromise devices via text messages if they know the victim's phone number and IMEI.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

OSX Ransomware Offered for Sale in the Underground

February 10, 2016 Added by:Idan Aharoni

Inteller has identified a new Ransomware malware being offered for sale in the underground, dubbed "GinX", which encrypts important and sensitive files on the victim's computer and which targets not only Windows operating systems, but MacBook's OSX as well.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes February 2016 - Review

February 10, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for February 2016, which closes 23 vulnerabilities in SAP products.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Five Security Threats Businesses Should Prepare for in 2016

January 28, 2016 Added by:Steve Durbin

After reviewing the current threat landscape, there are five prevalent security threats that the Information Security Forum believes businesses need to prepare for in 2016. These include, but are not limited to, the unintended consequences of state intervention, Big Data, mobile applications and the Internet of Things (IoT), cybercrime and the growing skills gap in the information security industr...

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Top Five Enterprise Data Privacy Mistakes

January 28, 2016 Added by:InfosecIsland News

The European General Data Protection Regulation is a new privacy regulation with fines as high as four percent of annual global revenue for companies that fail to safeguard data of EU citizens and residents. In the U.S. 16 states recently introduced new, ACLU supported data privacy legislation. In spite of efforts to improve privacy protections many enterprises are not doing enough to protect cons...

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Key Risk Management Issues For 2016

January 13, 2016 Added by:InfosecIsland News

Chief risk officers (CRO) will need to keep close watch on a number of strategic, operational, and external risks this year. Effective risk management and mitigation will be critical, since companies' strategies, business models, operations, reputations, and, ultimately, survival are on the line.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Study Shows Few Organizations Achieving "Full DevOps" Maturity

January 12, 2016 Added by:InfosecIsland News

According to the results of a new global study, commissioned by CA Technologies (NASDAQ:CA), only 20 percent of organizations that have attempted to implement DevOps have fully deployed it.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Security Notes January 2016 – Review

January 12, 2016 Added by:Alexander Polyakov

SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month).

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Ukranian Electric Grid Cyber Attack – It Can it Happen Here Too

January 09, 2016 Added by:Joe Weiss

As the NERC CIP process is public, our enemies are aware of the gaping cyber holes in our electric systems. When will the responsible entities wake up or will it be after they can’t turn their lights on?

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

BlackEnergy Malware Used in Ukraine Power Grid Attacks: Report

January 05, 2016 Added by:Eduard Kovacs

Security firm ESET has been monitoring attacks involving the threat and recently discovered that the Trojan had been used to target news media and electrical power companies in Ukraine.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

How to Calculate ROI and Justify Your Cybersecurity Budget

December 18, 2015 Added by:Ilia Kolochenko

If you speak with management about money – speak their language and you will definitely get what you need.

Comments  (0)

42fb3cf91c317323e67053c29ed52fbd

Cybersecurity Predictions for 2016

December 16, 2015 Added by:Tim Liu

2015 was another fascinating year for cybersecurity. From the OPM to Anthem, Ashley Madison and countless other data breaches, there was no shortage of stories capturing national attention. So what does 2016 have in store?

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Carrier Grade NAT and the DoS Consequences

December 16, 2015 Added by:Stefan Fouant

Through the use of dedicated DDoS mitigation devices, Carrier Grade NAT devices and their associated customers are protected from service disruptions, while still ensuring legitimate traffic is allowed unencumbered.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Why Companies Fail to Secure Their Web Apps

December 14, 2015 Added by:Ilia Kolochenko

The five things that companies do to make hacking into their websites and web applications even easier for the hackers.

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »