US-CERT

E11e506024f5d2b70f037b9af4734f33

Distinguishing Acts of War in Cyberspace

October 27, 2014 Added by:Stefano Mele

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

NIST warns on Zero-Day flaw in Samsung FindMyMobile

October 27, 2014 Added by:Pierluigi Paganini

The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).

Comments  (1)

C940e50f90b9e73f42045c05d49c6e17

Cyber-Criminals Quickly Adopt Critical Flash Player Vulnerability

October 23, 2014 Added by:Malwarebytes

Keeping your computer up-to-date is probably one of the best pieces of advice one can give when it comes to online security.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks

October 22, 2014 Added by:Pierluigi Paganini

Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.

Comments  (1)

0ead717779244d9aab5c1699308850d2

Security Companies Hit Hikit Backdoor Used by APT Group

October 16, 2014 Added by:Brian Prince

A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Critical Vulnerability Kills Again!!!

October 06, 2014 Added by:Anton Chuvakin

Do not make your security architecture solely reliant on patching. Big vulnerabilities will happen and so will zero-days, so make sure that your entire security architecture does not crumble if there is one critical vulnerability: do defense in depth, layers, “least privilege”, controls not reliant on updates, monitoring, deception, etc.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Five Anti-Analysis Tricks That Sometimes Fool Analysts

October 02, 2014 Added by:Malwarebytes

No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis.

Comments  (1)

Ebe141392ea3ebf96ba918c780ea1ebe

Shock Treatment

September 25, 2014 Added by:Wendy Nather

As many are explaining, one of the biggest problems with this #shellshock vulnerability is that it's in part of the Unix and Linux operating systems -- which means it's everywhere, particularly in things that were built decades ago and in things that were never meant to be updated.

Comments  (0)

Default-avatar

Parallels Among the Three Most Notorious POS Malware Attacking U.S. Retailers

September 22, 2014 Added by:Cyphort

After the first major success of POS malware breaching Target Corporation in November 2013 occurred, the number of POS device infections in the wild skyrocketed.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

2014 ICS Cyber Security Conference: Register Today to Hold Your Spot

September 17, 2014 Added by:InfosecIsland News

Following a sold out event in 2013, the 2014 ICS Cyber Security Conference is expected to attract more than 250 professionals from around the world and again sell out. Attendees can register online and pay just $1895 for a full conference registration which includes 4 days AND workshops on Monday.

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

The Next ‘Black Swan’ Event: A Cyberattack?

September 03, 2014 Added by:Patrick Oliver Graf

Sprinkled throughout the course of history are flashpoints that were as unexpected as they were far-reaching.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Improving Microsoft Patching

September 02, 2014 Added by:Tripwire Inc

We frequently work with customers who use patch management solutions and are missing patches. The reason? I don’t think anyone fully understands the Microsoft Patching process and the third-parties don’t always get it right either.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Vulnerability Management: Just Turn It Off! PART III

August 20, 2014 Added by:Tripwire Inc

In our third and final post of this series, Tripwire’s Vulnerability and Exposure Research Team (VERT) highlights four more unnecessary risks that often appear in even the most secure networks.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Connecting Bellwether Metrics to the Business

July 28, 2014 Added by:Tripwire Inc

Benchmark facilitates organizations who want to define and track their own Bellwether metrics—comparing only with their own internal goals and trends.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Israeli Military and Hamas trade Hacking Attacks

July 24, 2014 Added by:Dan Dieterle

As Israeli ground forces push into Gaza to remove militant Islamic troops and missiles, hacking teams from both sides ply their trades.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

The Five Stages of Vulnerability Management

July 21, 2014 Added by:Tripwire Inc

The key to having a good information security program within your organization is having a good vulnerability management program.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »