June 25, 2015 Added by:Eduard Kovacs
Based on data from its “telephony honeypot,” anti-fraud company Pindrop Security has determined that the number of scam calls aimed at enterprises has increased by 30 percent since 2013.
June 25, 2015 Added by:Anton Chuvakin
As a security technologist you may be asked to do the impossible.
June 22, 2015 Added by:Brian Prince
Researchers at Palo Alto Networks have identified a cyber-espionage operation targeting government and military organizations in Southeast Asia.
June 22, 2015 Added by:Pierluigi Paganini
The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airline’s ground computer systems at Warsaw’s Okecie airport.
June 18, 2015 Added by:Anthony M. Freed
The annual DDoS Threat Landscape Report reveals that distributed denial of service (DDoS) attacks can cost a victim as much as $40,000 dollars per hour in lost revenue, the loss of consumer trust, sensitive data theft, and intellectual property losses.
June 17, 2015 Added by:Anton Chuvakin
A reminder: cloud SIEM (“SaaS SIEM”) does not really exist yet [so, those who compute market share numbers for it are simply deluded]. However, today there are some “almost SaaS SIEM” products on the market and I wanted to quickly mention them here, as a part of my current cloud security monitoring research.
June 17, 2015 Added by:Joe Weiss
The lack of focus on the Level 1 devices has been a constant with most critical infrastructure protection articles, conferences, and personal discussions regardless of industry. Consequently, there is a need to better understand the security issues associated with these critical devices.
June 16, 2015 Added by:Eduard Kovacs
Chinese authorities are leveraging watering hole attacks and JSONP hijacking techniques to track down users who might attempt to hide their identity online, according to unified security management and threat intelligence company AlienVault.
June 11, 2015 Added by:Brian Prince
It's not just hype - point-of-sale (PoS) systems are being compromised more than ever, and much of the blame falls on mistakes surrounding remote access.
June 10, 2015 Added by:Brent Huston
More and more computer devices are designed to act like they are people, not machines.
June 08, 2015 Added by:Rebecca Herold
Over the years in the security classes I’ve taught, I’ve covered the importance of program change control management, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.
June 03, 2015 Added by:Patrick Oliver Graf
These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be.
June 02, 2015 Added by:Brian Prince
Bots are busy little bees on the Internet, and the world of mobile computing may be their next frontier.
June 02, 2015 Added by:Anton Chuvakin
What it all means is that you are buying on faith. There is nothing wrong with it, by the way, but it is useful to be honest about it…
June 01, 2015 Added by:Eduard Kovacs
Kaspersky Lab has published a report detailing the botnet-assisted distributed denial-of-service (DDoS) attacks launched by malicious actors in the first quarter of 2015.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015