July 24, 2014 Added by:Ali Golshan
We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.
July 23, 2014 Added by:Brent Huston
Even as the govt was touting their takedown, threat intelligence companies around the world (including MSI), were already noticing that the attackers were mutating, adapting and re-building a new platform to continue their attacks.
July 07, 2014 Added by:Tripwire Inc
Helping my mom know when to be careful should not be rocket science.
June 18, 2014 Added by:Malwarebytes
Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.
May 15, 2014 Added by:Anthony M. Freed
The phishing scam starts with emails that appear to have been sent by Google with “Mail Notice” or “New Lockout Notice” in the subject line.
May 07, 2014 Added by:Tripwire Inc
I have a confession to make. I created a fake profile on LinkedIn and we are probably connected.
March 14, 2014 Added by:Wayde York
The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.
January 22, 2014 Added by:Pete Herzog
Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.
November 12, 2013 Added by:Jason Clark
Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.
September 12, 2013 Added by:Mike Lennon
Vodafone Germany said an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany.
August 16, 2013 Added by:Vince Schiavone
From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.
August 15, 2013 Added by:Mikko Jakonen
“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.
August 08, 2013 Added by:Jon Stout
he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.
August 07, 2013 Added by:Jon Stout
The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...
August 01, 2013 Added by:Jon Stout
There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015