Latest Blog Posts
December 01, 2014 Added by:Tripwire Inc
The logic is – if cybersecurity is weak today (and the average Joe has no idea how truly breached our Internet fabric is), it may be even worse tomorrow with the advent of explosive IoT capabilities. Here’s why I say that.
November 27, 2014 Added by:Eduard Kovacs
A new piece of malware designed to steal data from point-of-sale (PoS) terminals has been found on electronic kiosks, including on public transport ticket vending machines, IntelCrawler reported on Wednesday.
November 26, 2014 Added by:Patrick Oliver Graf
Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.
November 26, 2014 Added by:Steve Martino
While data must be protected, not all data is of equal importance and therefore not in need of the same level of protection. Security teams should consider the types of data that exist within their organizations and what security measures will work best for each.
November 25, 2014 Added by:InfosecIsland News
Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.
November 25, 2014 Added by:Tripwire Inc
There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.
November 25, 2014 Added by:Rebecca Herold
As more crooks see how much money their buddies are making, you will see more and more types of ransomware being launched, putting you and your business at risk if you are not on the lookout for the signs of such a crime.
November 24, 2014 Added by:Tripwire Inc
Phishing scams come in all shapes and sizes. But one thing is for certain: they are all around us.
November 20, 2014 Added by:Identropy
Depending on the functionality and importance of your applications, databases and document folders, access should be reviewed periodically to ensure your organization is secure.
November 19, 2014 Added by:Tripwire Inc
Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.
November 19, 2014 Added by:Brent Huston
What I am referring to here is the vulnerability centralization brings to any system. It is great to pay less for electricity and to avoid some of the local blackouts we used to experience, but how many power plants and transmission towers would an enemy have to take out to cripple the whole grid?
November 18, 2014 Added by:Electronic Frontier Foundation
Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.
November 18, 2014 Added by:Patrick Oliver Graf
One year ago today, Target was gearing up for Black Friday sales and projecting a strong end to the year. That was the company’s primary focus. The same could be said for Neiman Marcus and Home Depot. And no one had even heard of Heartbleed or Shellshock yet.