Latest Blog Posts


FBI Says Researcher Admitted Hacking Airplane in Mid-Flight

May 19, 2015 Added by:Eduard Kovacs

A researcher who specializes in aircraft security admitted hacking into an airplane’s systems during a flight and successfully sending a climb command to one of the engines, according to an FBI search warrant application.

Comments  (0)


Top Three Attack Vectors for SAP Systems

May 19, 2015 Added by:Anthony M. Freed

A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.

Comments  (0)


Highlights From Verizon Data Breach Report 2015

May 19, 2015 Added by:Anton Chuvakin

Credential abuse still reign supreme.

Comments  (0)


It’s NOT the Technology Failing, It’s the Provisioning

May 18, 2015 Added by:Tripwire Inc

Over the last year or so, it has become increasingly obvious that there is a uniformity related to technology failures, and more than one would be expected to encounter.

Comments  (0)


Updated Dyre, Dropped by Office Macros

May 18, 2015 Added by:Ronnie Tokazowski

We recently analyzed a sample that started out appearing to be Dridex, but quickly turned into a headache leading to Dyre that featured some notable differences to past Dyre samples.

Comments  (0)


Whole Disk Encryption Explained

May 18, 2015 Added by:PCI Guru

There are a lot of security professionals and lay people that seem to believe that encryption is encryption and that is simply not the case.

Comments  (0)


Adobe Issued a Significant Update for Flash Player, Reader and Acrobat

May 14, 2015 Added by:Pierluigi Paganini

Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.

Comments  (0)


Networked Devices Fueling Rise in DDoS Reflection Attacks

May 14, 2015 Added by:Anthony M. Freed

Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques.

Comments  (0)


VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts

May 14, 2015 Added by:Brian Prince

Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.

Comments  (0)


The Top 10 Highest Paying Jobs in Information Security – Part 1

May 13, 2015 Added by:Tripwire Inc

Given the evolving threat landscape, it is no surprise that the field of information security is booming. A report issued by Burning Glass Technologies reveals that job postings across the industry have grown 74 percent between 2007 and 2013—twice the rate of all other IT jobs.

Comments  (0)


When Your Surgeon Really Is a Hack

May 13, 2015 Added by:Robert Vamosi

There’s been a quiet revolution going on within hospitals, mostly in the United States.

Comments  (0)


Organizations Must Consider Privacy Harms

May 13, 2015 Added by:Rebecca Herold

Addressing privacy requires privacy harms consideration in addition to identifying security and privacy risks.

Comments  (0)


MacKeeper Patches Serious Remote Code Execution Flaw

May 12, 2015 Added by:Eduard Kovacs

The developers of MacKeeper, the controversial utility software suite for OS X, have patched a critical vulnerability that could have been exploited to remotely execute arbitrary code on affected systems.

Comments  (0)


Top Ten List of Most Exposed Software

May 12, 2015 Added by:Anthony M. Freed

Oracle Java, Apple QuickTime, and Adobe Reader lead the pack for the top ten most exposed software in the U.S., according to a new regional-based study of vulnerable and unpatched software deployed on PCs.

Comments  (0)


New PCI DSS Changes are Around the Corner

May 12, 2015 Added by:Don Brooks

The latest payment card industry data security standard, a set of requirements designed to help businesses better secure their customers’ payment card information, took effect January 1, 2015, however some of the changes become mandatory at the end of next month.

Comments  (0)


C-Level Executives and the Need for Increased Cybersecurity Literacy

May 11, 2015 Added by:Tripwire Inc

Now more than ever, it’s evident cybersecurity risk oversight at the board level is essential to keep any business or organization afloat – and off the headlines.

Comments  (0)

« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »