Latest Blog Posts

03b2ceb73723f8b53cd533e4fba898ee

Adobe Issued a Significant Update for Flash Player, Reader and Acrobat

May 14, 2015 Added by:Pierluigi Paganini

Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Networked Devices Fueling Rise in DDoS Reflection Attacks

May 14, 2015 Added by:Anthony M. Freed

Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques.

Comments  (0)

0ead717779244d9aab5c1699308850d2

VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts

May 14, 2015 Added by:Brian Prince

Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Top 10 Highest Paying Jobs in Information Security – Part 1

May 13, 2015 Added by:Tripwire Inc

Given the evolving threat landscape, it is no surprise that the field of information security is booming. A report issued by Burning Glass Technologies reveals that job postings across the industry have grown 74 percent between 2007 and 2013—twice the rate of all other IT jobs.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

When Your Surgeon Really Is a Hack

May 13, 2015 Added by:Robert Vamosi

There’s been a quiet revolution going on within hospitals, mostly in the United States.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Organizations Must Consider Privacy Harms

May 13, 2015 Added by:Rebecca Herold

Addressing privacy requires privacy harms consideration in addition to identifying security and privacy risks.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

MacKeeper Patches Serious Remote Code Execution Flaw

May 12, 2015 Added by:Eduard Kovacs

The developers of MacKeeper, the controversial utility software suite for OS X, have patched a critical vulnerability that could have been exploited to remotely execute arbitrary code on affected systems.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Ten List of Most Exposed Software

May 12, 2015 Added by:Anthony M. Freed

Oracle Java, Apple QuickTime, and Adobe Reader lead the pack for the top ten most exposed software in the U.S., according to a new regional-based study of vulnerable and unpatched software deployed on PCs.

Comments  (0)

Default-avatar

New PCI DSS Changes are Around the Corner

May 12, 2015 Added by:Don Brooks

The latest payment card industry data security standard, a set of requirements designed to help businesses better secure their customers’ payment card information, took effect January 1, 2015, however some of the changes become mandatory at the end of next month.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

C-Level Executives and the Need for Increased Cybersecurity Literacy

May 11, 2015 Added by:Tripwire Inc

Now more than ever, it’s evident cybersecurity risk oversight at the board level is essential to keep any business or organization afloat – and off the headlines.

Comments  (0)

B16fab97daa7df5ccd0d892c340b0541

Falling Off the End of the Cyber Kill Chain

May 11, 2015 Added by:Anup Ghosh

In our zeal to declare prevention dead, we should not lose sight that $1 spent on prevention is worth $1M in post-breach incident response.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

First Step After Breach

May 11, 2015 Added by:Brent Huston

Discovering an information security breach can be a shock! Picture it: you are enjoying a regular work day and WHAM! Suddenly you are at the center of an incident that could possibly affect the future of the company and perhaps your own future as well.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Look Backward to Be Future-Ready for BYOD

May 11, 2015 Added by:Rebecca Herold

The types of new technologies that employees are using within work environments and for business activities are going to continue to grow exponentially. Their personal data is getting more mixed with the business data on those devices. How can organizations get future ready for these increasingly high tech employees?

Comments  (0)

0ead717779244d9aab5c1699308850d2

Rombertik Strike at MBR Latest in Long Line of Malware Self-Defense Tactics

May 07, 2015 Added by:Brian Prince

The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

The Sony Breach Shows that Security Needs to be a Boardroom Topic

May 07, 2015 Added by:Peter Zavlaris

The world has plunged headfirst into the Internet revolution without taking into account the repercussions technological repercussions.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Why You Need a Disciplined Response to Digital Forensics

May 07, 2015 Added by:Tripwire Inc

With acceptance that the prospect of unauthorised incursion, hacks and/or compromise of corporate, and personal systems is to now be expected, it would seem to make good sense to accommodate mechanisms with which the organisation may respond to such manifestation as and when they are encountered.

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »