December 22, 2014 Added by:Joe Weiss
With all of the focus on cyber security one could expect that DHS is doing a credible job in helping to protect our country. Unfortunately, that may not be the case.
December 17, 2014 Added by:Pierluigi Paganini
The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.
December 05, 2014 Added by:Paul Lipman
The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...
December 04, 2014 Added by:Joe Weiss
This is not an “I told you so” note. It is a note expressing concern that our critical infrastructure organizations such as NERC, FERC, NRC, NEI, AWWA, and others do not appear to be taking this threat seriously.
December 03, 2014 Added by:Steve Durbin
Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...
November 26, 2014 Added by:Patrick Oliver Graf
Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.
November 25, 2014 Added by:Tripwire Inc
There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.
November 17, 2014 Added by:Joe Weiss
In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.
November 03, 2014 Added by:Brent Huston
It is true that the most attacks against information systems come from external attackers, but that does not mean the internal threat is negligible.
November 03, 2014 Added by:Joe Weiss
I am very concerned about those statements concerning the uniqueness of the power industry because I do not believe it is unique except for addressing compliance requirements set forth in the NERC CIPs.
October 27, 2014 Added by:Pierluigi Paganini
The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).
October 23, 2014 Added by:Malwarebytes
Keeping your computer up-to-date is probably one of the best pieces of advice one can give when it comes to online security.
October 22, 2014 Added by:Pierluigi Paganini
Security experts at Google and McAfee have discovered a new zero-day vulnerability in Microsoft OLE being exploited in targeted attacks.
October 16, 2014 Added by:Brian Prince
A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.
Indicators of Compromise for Malware Used by... Jeanson Ancheta on 12-22-2014
Paying Lip Service (Mostly) to User Educatio... Sherrley Max on 12-20-2014
Update 3: Hackers May Leak Norton Antivirus ... Prabhas Raju on 12-19-2014