Phishing

Bd07d58f0d31d48d3764821d109bf165

8 Security Practices to Use in Your Employee Training and Awareness Program

April 27, 2015 Added by:Tripwire Inc

This might be hard to believe, but it is true: 59 percent of data breaches are happening not because of some smart hacker who wants to do harm to your company but because of your own employees.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

2015 Verizon DBIR and the Human Attack Surface

April 16, 2015 Added by:Tripwire Inc

Verizon’s annual Data Breach Investigations Report (DBIR) gives annual analysis and insight to the prior year’s security incidents and confirmed data breaches. As a security practitioner, I look to this report as a bellwether for our own security practices – what patterns are emerging and what should be my immediate takeaways to better protect my organization.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Real-Time Bidding and Malvertising: A Case Study

April 15, 2015 Added by:Malwarebytes

Malvertising continues to be one of the biggest and most effective infection mechanism which, for the most part, is based on rogue advertisers inserting malicious ads in the machine.

Comments  (0)

6d117b57d55f63febe392e40a478011f

FFIEC Issues Guidance on Destructive Malware Attacks

April 14, 2015 Added by:Anthony M. Freed

The Federal Financial Institutions Examination Council (FFIEC) released two documents with guidance for financial institutions on mitigating risks from the increase in cyber attacks that compromise user credentials or employ destructive software.

Comments  (0)

306708aaf995cf6a77d3083885b60907

FireEye Reveals APT30: A Decade-Long Cyber Espionage Campaign Targeting South East Asia

April 12, 2015 Added by:Mike Lennon

FireEye on Sunday uncovered details of a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)

8eb7be5a13cc39a3e56b78aba08b2039

Long Live the Botnet

April 07, 2015 Added by:Or Katz

You might think that being exposed in a security blog post might bring shame to a bot, and that at the very least it might spend some time underground.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Cybercrime Is Now More Profitable Than The Drug Trade

April 06, 2015 Added by:Tripwire Inc

As reported by the 2013 Europol Serious & Organized Threat Assessment, the “Total Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.”

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Things I Learned Talking to InfoSec People About Crime

March 30, 2015 Added by:Brent Huston

There is a complete disconnect between the way most bad guys think and operate and the way many infosec folks think and operate.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

5 Social Engineering Attacks to Watch Out For

March 25, 2015 Added by:Tripwire Inc

Hackers who engage in social engineering attacks prey off of human psychology and curiosity in order to compromise their targets’ information. With this human-centric focus in mind, it is up to users and employees to counter these types of attacks.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Facebook Worm Variant Leverages Multiple Cloud Services

March 12, 2015 Added by:Malwarebytes

Social networks are particularly interesting for malware authors because they can be leveraged to spread an infection starting with a single person.

Comments  (5)

0ead717779244d9aab5c1699308850d2

Financial Malware Fell in 2014 As Takedown Operations Have Impact

March 05, 2015 Added by:Brian Prince

One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.

Comments  (16)

1c7e19555c747737c9064d29ea238f27

DARPA’S Memex Project Shines Light on the Dark Web

March 03, 2015 Added by:Robert Vamosi

To better combat the increasing use of the Dark Web for illegal purposes, DARPA, the U.S. military’s Defense Advanced Research Projects Agency, is building a search engine known as Memex for law enforcement use.

Comments  (2)

Fb8b25d02a3d508548a993c59946c1e6

SIGINT and Cyber Intelligence

February 19, 2015 Added by:Scott Fitzpatrick

It’s fascinating to watch the political climate being held sway with what are identified as “cyber terrorism” and “cyber war.” But it’s not the first time the Department of Defense has had to come to grips with a polemic decision that would require reengineering their entire fiscal architecture.

Comments  (5)

Page « < 1 - 2 - 3 - 4 - 5 > »