Vulns & Alerts
May 21, 2015 Added by:Tripwire Inc
During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.
May 14, 2015 Added by:Pierluigi Paganini
Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.
May 14, 2015 Added by:Brian Prince
Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.
May 06, 2015 Added by:Steve Durbin
Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.
May 06, 2015 Added by:Paul Lipman
Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.
May 06, 2015 Added by:Eduard Kovacs
Researchers have identified several critical vulnerabilities in Hospira LifeCare patient-controlled analgesia (PCA) infusion systems, which can be exploited by a remote attacker to take complete control of affected devices.
May 06, 2015 Added by:Joe Weiss
There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.
April 30, 2015 Added by:Eduard Kovacs
Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
April 14, 2015 Added by:Joe Weiss
There is a tendency by many in the cyber security community to only care about malicious cyber attacks as opposed to unintentional cyber incidents.
April 10, 2015 Added by:Paul Lipman
While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.
April 09, 2015 Added by:Peter Zavlaris
The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.
April 09, 2015 Added by:Joe Weiss
Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.
April 02, 2015 Added by:Joe Weiss
There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.
April 01, 2015 Added by:Malwarebytes
WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015