Network Access Control

03b2ceb73723f8b53cd533e4fba898ee

SandWorm Hacking Team Exploited 0-day Against NATO and Other Government Entities

October 14, 2014 Added by:Pierluigi Paganini

According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Security Lessons from Complex, Dynamic Environments

October 14, 2014 Added by:Rafal Los

Security is hard, folks.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Shellshock Leaves Deep Impact on Network Security

October 09, 2014 Added by:Patrick Oliver Graf

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What Is ICS Cybersecurity – You Don't Need Digital Assets

October 08, 2014 Added by:Joe Weiss

I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Network Security for CIOs: A Marathon or a Sprint?

October 02, 2014 Added by:Patrick Oliver Graf

The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Patch for ShellShock ASAP!

September 30, 2014 Added by:Brent Huston

Source IPs for probes looking for the vulnerability are growing slowly in number and scope of scans. (As of 9/30/14, 10am Eastern).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Bash Bug Could Wreak Havoc on Linux and OS X Systems

September 25, 2014 Added by:Malwarebytes

It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

Cyber Security and the Electric Grid – It IS a Problem

September 15, 2014 Added by:Joe Weiss

The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.

Comments  (9)

B42221fcb8abc51212416aab3b29468f

Using Network Intelligence to Turn the Table on Hackers

September 15, 2014 Added by:Greg Akers

Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.

Comments  (0)

F45df53d99605d46f5ae32b7bed9fe22

The JPMorgan Chase Breach: How Are Hackers Stealing Your Credentials?

September 11, 2014 Added by:Thu Pham

If you needed more proof that authentication attacks are on the rise, look no further than the recent JP Morgan Chase data breach.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

CERT Pudding and the War on Bad SSL

September 10, 2014 Added by:Tripwire Inc

SSL implementation problems exist in apps of all shapes, sizes and function, ranging from those with little sensitive data and few users to apps with millions of active users handling some of our most sensitive data, such as financial transactions and account login information.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Brazilian Cyber Criminals Targeting Home Routers

September 03, 2014 Added by:Pierluigi Paganini

Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack.

Comments  (0)

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »