Network->General

03b2ceb73723f8b53cd533e4fba898ee

Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (0)

65be44ae7088566069cc3bef454174a7

The 3 Necessary Elements for Effective Information Security Management

December 15, 2014 Added by:Rebecca Herold

In addition to many really huge organizations, I’ve worked with hundreds of small to midsize businesses over the years. I’ve seen a large portion of the small to midsize organizations completely omitting not just one, but two and in many situations all three of these core elements.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Security Backdoors are Bad News—But Some Lawmakers Are Taking Action to Close Them

December 11, 2014 Added by:Electronic Frontier Foundation

As many privacy advocates have pointed out recently, it looks like some people in the federal government are intent on reviving the failed Crypto Wars of the 90s.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

POODLE Redux: Now Affecting Some TLS Implementations

December 10, 2014 Added by:Tripwire Inc

Although vendors of tools that were vulnerable to the flaw quickly fixed their systems to rely on TLS vs SSL v3, a problem still exists due to TLS padding being a subset of SSLv3’s so that decoding functions for SSLv3 can be used with TLS, as well.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Hackers Leak Scripts, Celebrity Phones and Aliases at Sony Pictures Entertainment

December 10, 2014 Added by:Pierluigi Paganini

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Trouble with the Endpoint

December 09, 2014 Added by:Patrick Oliver Graf

Much to the dismay of network administrators, IT security today is complex and multi-faceted, from the varied attack vectors to the different types of attackers themselves. But there is always one constant: the endpoint.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

F45df53d99605d46f5ae32b7bed9fe22

The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Sifting Fact from Fiction with All Writs and Encryption: No Backdoors

December 04, 2014 Added by:Electronic Frontier Foundation

Following recent reports in the Wall Street Journal and Ars Technica, there’s been new interest in the government’s use of a relatively obscure law, the All Writs Act.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

The Biggest Cyber Threats Against Three At-Risk Verticals: Retail, Healthcare and Finance

December 03, 2014 Added by:Patrick Oliver Graf

In this “post-privacy” era, network administrators need to understand cyber threats against them, inside and out, in order to set up the strongest defenses.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

FBI Warns of Major Malware-Based Attacks Following the Sony Pictures Hack

December 02, 2014 Added by:Pierluigi Paganini

According to the Reuters Agency, the malicious code described in the alert could be the attack vector used by threat actors in the incident occurred to the Sony Pictures.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Internet of Things: Hack My Nannycam

December 01, 2014 Added by:Tripwire Inc

The logic is – if cybersecurity is weak today (and the average Joe has no idea how truly breached our Internet fabric is), it may be even worse tomorrow with the advent of explosive IoT capabilities. Here’s why I say that.

Comments  (0)

65be44ae7088566069cc3bef454174a7

4 Privacy Predictions for 2015

December 01, 2014 Added by:Rebecca Herold

I was asked to provide a few predictions for 2015. Based upon not only what I’ve seen in 2014, but also foreshadowing from the past two-three decades, here are some realistic possibilities.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

Operation Onymous Challenges Tor to Strengthen Its Security

November 19, 2014 Added by:Tripwire Inc

Earlier in November, Europol, the FBI and the Department of Homeland Security coordinated a global sting against the “Dark Web” drug trade.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »