Vulns & Alerts

E595c1d49bf4a26f8e14ce59812af80e

The Three Human Failures Behind Remote Access Shortcomings

November 26, 2014 Added by:Patrick Oliver Graf

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (1)

201d6e4b7cd0350a1a9ef6e856e28341

The Arrogance of the US Nuclear Power Industry - We Don't Want to Look at Everything

November 17, 2014 Added by:Joe Weiss

In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Data Breaches are a Global Problem

November 06, 2014 Added by:Brent Huston

For those of you who maybe just thought that data breaches were only happening against US companies, and only by a certain country as the culprit, we wanted to remind you that this certainly isn’t so.

Comments  (1)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Why Do Security Testing of Internal Computer Networks?

November 03, 2014 Added by:Brent Huston

It is true that the most attacks against information systems come from external attackers, but that does not mean the internal threat is negligible.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

The Power Industry Has Unique Technical Needs in Addressing Cyber Security - NOT!

November 03, 2014 Added by:Joe Weiss

I am very concerned about those statements concerning the uniqueness of the power industry because I do not believe it is unique except for addressing compliance requirements set forth in the NERC CIPs.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Distinguishing Acts of War in Cyberspace

October 27, 2014 Added by:Stefano Mele

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

NIST warns on Zero-Day flaw in Samsung FindMyMobile

October 27, 2014 Added by:Pierluigi Paganini

The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).

Comments  (2)

C940e50f90b9e73f42045c05d49c6e17

Cyber-Criminals Quickly Adopt Critical Flash Player Vulnerability

October 23, 2014 Added by:Malwarebytes

Keeping your computer up-to-date is probably one of the best pieces of advice one can give when it comes to online security.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks

October 22, 2014 Added by:Pierluigi Paganini

Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.

Comments  (1)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Kmart Says Hackers Breached Payment System

October 10, 2014 Added by:Mike Lennon

Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks that have resulted in the exposure of customer data and payment card information.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Critical Vulnerability Kills Again!!!

October 06, 2014 Added by:Anton Chuvakin

Do not make your security architecture solely reliant on patching. Big vulnerabilities will happen and so will zero-days, so make sure that your entire security architecture does not crumble if there is one critical vulnerability: do defense in depth, layers, “least privilege”, controls not reliant on updates, monitoring, deception, etc.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Five Anti-Analysis Tricks That Sometimes Fool Analysts

October 02, 2014 Added by:Malwarebytes

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »