SCADA

F5b1211c3952ce30f829cd3c757a1a7f

Cyphort Detects Surge in Ad Network Infections, a.k.a. “Malvertising”

July 24, 2014 Added by:Ali Golshan

We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Israeli Military and Hamas trade Hacking Attacks

July 24, 2014 Added by:Dan Dieterle

As Israeli ground forces push into Gaza to remove militant Islamic troops and missiles, hacking teams from both sides ply their trades.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Crypto Locker Down, But NOT Out

July 23, 2014 Added by:Brent Huston

Even as the govt was touting their takedown, threat intelligence companies around the world (including MSI), were already noticing that the attackers were mutating, adapting and re-building a new platform to continue their attacks.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Snowden Continues to Expose Allied Cyber Tactics

July 17, 2014 Added by:Dan Dieterle

NSA whistleblower and Putin poster boy Edward Snowden apparently released yet another document, this one exposing UK cyber spying techniques allegedly used by the GCHQ.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Hacks of Houston Astros, Butler University Put Network Security on Center Stage

July 14, 2014 Added by:Patrick Oliver Graf

Together, the high-profile hacking of the Houston Astros and Butler University show why it’s important for every organization to think like an enterprise in constructing a network security plan.

Comments  (0)

7b072d611db66025d89ff3137dcddfb3

Cyber Espionage Campaign Hits Energy Companies

July 10, 2014 Added by:Joel Langill

Over the past couple of weeks, cybersecurity vendors have announced the uncovering of a successful cyber espionage campaign carried out by the Dragonfy hacking group.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference Opens Call for Papers

July 10, 2014 Added by:Mike Lennon

SecurityWeek today announced the official Call for Papers for the 2014 Industrial Control Systems (ICS) Cyber Security Conference, to be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia.

Comments  (0)

4e9404278ec48b9cce4fcfa8ca048c29

Defense in Depth for Advanced Threat Protection

July 09, 2014 Added by:Alain Mayer

I believe that defense in depth – a long-established information assurance concept – can help in developing a sensible strategy for the evolving threat landscape.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Google Aurora vs ICS Aurora – An industry and DHS Debacle

July 08, 2014 Added by:Joe Weiss

This is actually two blogs in one. The first is about DHS releasing critical information they weren’t even asked for. The second is about the lack of progress on addressing a subject that DHS made public.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Government Network Security Failures Led to Remote Access Breaches

July 07, 2014 Added by:Patrick Oliver Graf

Former NSA director Keith Alexander pointed out earlier this week that government networks are far from secure, as the NSA and the Department of Defense uncovered more than 1,500 pieces of malware on the U.S. government’s most secret networks.

Comments  (0)

306708aaf995cf6a77d3083885b60907

2014 ICS Cyber Security Conference to Take Place October 20-23 in Atlanta

July 07, 2014 Added by:Mike Lennon

The 2014 ICS Cybersecurity Conference will be held October 20 – 23, 2014 at the Georgia Tech Hotel and Conference Center in Atlanta, Georgia, USA.

Comments  (0)

Default-avatar

How Enterprises Can Leverage SMS to Minimize Security Risks and Aftermath

July 03, 2014 Added by:Steve French

As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

IoT: Get Security Right The First Time

June 30, 2014 Added by:Patrick Oliver Graf

While there’s excitement about IoT’s potential to create new business and boost productivity and convenience, the technology community can’t forget about security.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Why a User-Centric Approach is Required for Network Security

June 25, 2014 Added by:Patrick Oliver Graf

With employees demanding network access for many different types of devices, operating systems and applications, a CIO’s job has never been harder. But do employees always know what’s best for network security?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Are Spies or Malware in our ICS Networks - Who is Really Looking?

June 23, 2014 Added by:Joe Weiss

Are spies in our ICS networks – who really knows but we really should find out.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »