May 06, 2015 Added by:Paul Lipman
Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.
May 06, 2015 Added by:Joe Weiss
There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.
April 30, 2015 Added by:Malwarebytes
The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.
April 29, 2015 Added by:Anthony M. Freed
The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.
April 28, 2015 Added by:Peter Zavlaris
The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.
April 28, 2015 Added by:Robert Vamosi
Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.
April 23, 2015 Added by:Eduard Kovacs
According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.
April 22, 2015 Added by:Brian Prince
The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.
April 22, 2015 Added by:Tripwire Inc
Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.
April 19, 2015 Added by:Anthony M. Freed
Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
April 15, 2015 Added by:Brian Prince
In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.
April 15, 2015 Added by:Mary Landesman
People differ in how they approach data analytics. One camp prefers to postulate a theory and find data that supports or negates that theory. Another camp prefers to let the data tell the story.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015