Latest Blog Posts

C492d23f3758cf5cdee0b35b74cc36f1

Can CTF Players Replace Professional Penetration Testers?

September 23, 2015 Added by:Ilia Kolochenko

The first issue with the majority of CTFs is that they focus on single result (flag), rather than a process of comprehensive consecutive security testing.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

3 out of 4 Consumers Will Leave your Websites Because of Security Concerns

September 22, 2015 Added by:Peter Zavlaris

As part of the ongoing battle for eyeballs, marketing departments implement tracking technologies that encroach on customer privacy, while digital assets are cobbled together from third-party technology to accelerate time-to-market.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Red Hat Warns of Ceph Website Breach

September 19, 2015 Added by:Eduard Kovacs

Red Hat has detected a breach on two Ceph storage system websites and the integrity of the signing keys has been compromised.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The 2015 ICS Cyber Security Conference

September 18, 2015 Added by:Joe Weiss

The 2015 ICS Cyber Security Conference will be October 26-29 at the Georgia Tech Hotel and Conference Center in Atlanta (www.icscybersecurityconference.com ). This will be the 15th in a series that began in 2002. The Conference will have some new twists, but will also stay true to its roots - ICS cyber security and what makes ICS cyber security different. Specifically, there will be....

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

FS-ISAC to Share Threat Intelligence With Federal Reserve Banks

September 16, 2015 Added by:InfosecIsland News

The Financial Services Information Sharing and Analysis Center (FS-ISAC) announced an arrangement with the Federal Reserve Banks to provide direct access to FS-ISAC security threat information to over 10,000 of their financial institution customers.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Beware of the Imitations

September 16, 2015 Added by:Jayson Wylie

There have been reports of compromised Cisco IOS files being run in the wild. There have also been warnings about reversed engineered IOS images been detected.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Similar Threats, Different Reponses: Report

September 15, 2015 Added by:InfosecIsland News

Both large and medium size businesses face many of the same security threats—but often respond to them differently, a recent study conducted by Bitdefender in the United States reveals.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Wireless Security 101

September 09, 2015 Added by:Jayson Wylie

Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Segmentation Beyond VLANs, Subnets, and Zones

September 01, 2015 Added by:InfosecIsland News

In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

A Guide to AWS Security

August 20, 2015 Added by:Avishai Wool

Security in AWS is based on a shared responsibility model: Amazon provides and secures the infrastructure, and you are responsible for securing what you run on it.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Critical iOS "Quicksand" Vulnerability Lets Malicious Mobile Apps to Grab Enterprise Credentials

August 20, 2015 Added by:InfosecIsland News

Mobile security researchers have identified a critical security flaw in the iOS mobile operating system that affects all iPhone, iPod touch, iPad devices running iOS 7 and later.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Microsoft Patches Critical IE Flaw Exploited in the Wild

August 18, 2015 Added by:Mike Lennon

Microsoft issued an emergency out-of-band update to fix a critical vulnerability (CVE-2015-2502) being actively exploited in the wild and affecting all versions of Internet Explorer from IE 7 through 11.

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Get Physical with your Physical Space

August 17, 2015 Added by:Jayson Wylie

Current social engineering practice has gone beyond mail phishing scams and there is high probability that there is potential of a malicious presence in the mix within the place of work.

Comments  (0)

B7975305d292bb47fb3934171c2a0685

Businesses Should Take a Pass on Traditional Password Security

August 04, 2015 Added by:Geoff Sanders

Historical forms of authentication were never meant for the networked landscape we live in today. The first passwords were adequate authentication solutions only because the systems they secured were isolated. Unfortunately, the isolated systems that pervaded the early days of the computer revolution has set the foundation for authentication in the Internet Age.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid

July 31, 2015 Added by:Joe Weiss

The recent Lloyd’s report on cyber implications of the electric grid serves an important need to understand the insurance implications of a cyber attack against the electric grid. Unfortunately, I believe the technical aspects of the hypothesized attack in the Lloyd’s study are too flawed to be used.

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »