Latest Blog Posts

1fec6881fe864bc30369edb548ea22b1

Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

05a24d7e4020553c4a923a0d8126d8c9

Reducing the Attack Surface is a Fool’s Errand

April 01, 2016 Added by:Paul Morville

This April Fool’s Day, let’s acknowledge that a security strategy focused exclusively on patching and prevention is a fool’s errand and let’s move towards an adaptive approach that includes prevention, detection, continuous visibility and response.

Comments  (0)

536eb4d14b8450497be0d514a2991f3a

Why You Should Move Security Away from Security

March 31, 2016 Added by:Nimmy Reichenberg

Automating your security processes and aligning the various groups within your IT department is key to successfully migrating selected operations away from your security team.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Malvertising Attack Hits Top Australian Classified Site

March 29, 2016 Added by:InfosecIsland News

Free classified advertising site Gumtree was hit by a malvertising attack that resulted in users being exposed to the Angler exploit kit (EK), researchers at Malwarebytes say.

Comments  (0)

7783bc8790e6328988ddfa4f92055e12

Encryption and Privacy Debates Highlight Serious Challenges for Both Consumers and Businesses

March 24, 2016 Added by:Robert Grapes

As we become more connected through wearables, mobile devices, IoT devices in our homes, security cameras, health trackers, and online bank accounts, we become exponentially more vulnerable to criminal attacks and government intrusion. Civil liberties, anonymity, personal safety, home security, children safety—all is at risk.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webinar: Why Risk-Aware Cultures Are More Critical To Success Than Ever Before

March 24, 2016 Added by:InfosecIsland News

Join MediaPro and Forrester Research analyst Nick Hayes on March 24th from 10-11am PDT for a webcast on how risk-aware cultures bolster brand resilience from the inside out.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Steam Stealers Are a Booming Business: Kaspersky Lab

March 15, 2016 Added by:InfosecIsland News

Kaspersky Lab researchers been taking a closer look at Steam Stealers, a booming business for many cybercriminals around the world and targeted specifically at Steam users.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Flash Vulnerabilities Most Targeted by Exploit Kits in 2015

March 15, 2016 Added by:InfosecIsland News

Adobe’s Flash Player in 2015 was the dominant application in terms of vulnerabilities targeted by exploit kits (EKs), with 13 of the 17 new flaws added to these malicious programs pertaining to the web plugin.

Comments  (0)

179bc88eff504b5632ac8fbd9ee7b09d

Six Things to Know About Computer Theft

March 15, 2016 Added by:Eyal Bek

Besides the usual precautions, encryption can put a huge dent in the problem by making stored information unintelligible to intruders. Self-encrypting drives further help by minimizing the performance impact by offloading encryption to specialized hardware and taking humans out of the picture.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

March Madness Apps May Create BYOD Risk for Enterprises

March 14, 2016 Added by:InfosecIsland News

Unbeknownst to Employees, the Behaviors and Functions of Widely Used March Madness Sport and Media Apps May Violate Corporate BYOD Risk Policies

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Web Application Firewall: a Must-Have Security Control or an Outdated Technology?

March 09, 2016 Added by:Ilia Kolochenko

Being insufficient to properly mitigate complicated security flaws in modern web applications, a Web Application Firewall still remains a necessary security control within organizations. 

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Diffie and Hellman Receive ACM A.M. Turing Award

March 08, 2016 Added by:InfosecIsland News

The Association for Computing Machinery (ACM) has announced that cryptography pioneers Whitfield Diffie and Martin Hellman won this year’s A.M. Turing Award.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Exploit Kits, Android Malware Dominated 2015: Dell

February 22, 2016 Added by:InfosecIsland News

Dell has released its Dell Security Annual Threat Report 2016, revealing that key trends defining the threat landscape, ranging from new, aggressive tactics employed by adversaries to a massive increase in malware attacks in 2015.

Comments  (0)


« First < Previous | 4 - 5 - 6 - 7 - 8 | Next > Last »