SCADA

C58e402c41b06ade1da4ce5bab5e19aa

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Scenario-based Training for Nuclear Power Plants Based on Actual Nuclear Plant Cyber Incidents

May 06, 2015 Added by:Joe Weiss

There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Inside IaaS Security Challenges for Enterprises

May 05, 2015 Added by:Brian Prince

Infrastructure-as-a-service can provide an attractive option for businesses, but approaching security wrong can come with a cost all its own.

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

By All Means, Do as Little as Possible

May 04, 2015 Added by:PCI Guru

I write this because I have had enough of arguing over the lowest common denominator when it comes to securing networks, servers and applications.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Password Alert for Chrome, and other Extensions

April 30, 2015 Added by:Malwarebytes

The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.

Comments  (0)

6d117b57d55f63febe392e40a478011f

New Vulnerabilities Identified in Network Time Protocol Daemon (NTPD)

April 29, 2015 Added by:Anthony M. Freed

The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

First Lose the “Cyber” – Then We Can Talk

April 28, 2015 Added by:Robert Vamosi

Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

CozyDuke APT Behind White House, State Department Attacks: Kaspersky

April 23, 2015 Added by:Eduard Kovacs

According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Security of Internet of Things in Spotlight at RSA Conference

April 22, 2015 Added by:Brian Prince

The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

How to Protect Yourself From Caller ID Spoofing

April 22, 2015 Added by:Tripwire Inc

Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Healthcare Industry Challenged by Data Breaches, Compliance

April 15, 2015 Added by:Brian Prince

In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.

Comments  (0)

2d84e74c0a40157cd7d83753045dfb96

What Threat Intelligence Data Can Tell Us: The Sad Story of WF

April 15, 2015 Added by:Mary Landesman

People differ in how they approach data analytics. One camp prefers to postulate a theory and find data that supports or negates that theory. Another camp prefers to let the data tell the story.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »