US-CERT

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

VERT Vuln School: Return-Oriented Programming (ROP) 101

June 25, 2015 Added by:Tripwire Inc

In the beginning, there were stack buffer overflows everywhere.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Researchers Demonstrate Stealing Encryption Keys Via Radio

June 24, 2015 Added by:Brian Prince

Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Half of All Websites Tested Failed Security and Privacy Assessment

June 23, 2015 Added by:Anthony M. Freed

Half of the nearly 1000 websites evaluated in the 2015 Online Trust Audit & Honor Roll study conducted by the Online Trust Alliance (OTA) were found to be failing to protect consumer’s personal data and privacy.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

7 Development AppSec Tricks to Keep the Hackers Away – Part 1

June 17, 2015 Added by:Tripwire Inc

The mammoth rise in cybercrime has made organizations revise their application security strategy and implement new techniques to safeguard their software. This is largely because traditional security methodologies, such as Manual Testing and Web Application Firewalls (WAF), have been rendered irrelevant due to evolving hacking techniques.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Several Hospira Drug Pumps Use Vulnerable Software: Researcher

June 10, 2015 Added by:Eduard Kovacs

A researcher who has analyzed the software installed on infusion pumps manufactured by Hospira says several models are plagued by the vulnerabilities disclosed earlier this year.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Prioritizing Patch Management Critical to Security

June 09, 2015 Added by:Brian Prince

Recent stats from the Verizon Data Breach report showed that many of the most exploited vulnerabilities in 2014 were nearly a decade old, and some were even more ancient than that.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Another Day, Another Health Insurance Breach

June 08, 2015 Added by:Peter Zavlaris

Insurance companies, especially those in healthcare, continue to be prime targets for cybercrime.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Microsoft Patching: Don’t Forget to Read the Fine Print

May 21, 2015 Added by:Tripwire Inc

During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Adobe Issued a Significant Update for Flash Player, Reader and Acrobat

May 14, 2015 Added by:Pierluigi Paganini

Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.

Comments  (0)

0ead717779244d9aab5c1699308850d2

VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts

May 14, 2015 Added by:Brian Prince

Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Ten List of Most Exposed Software

May 12, 2015 Added by:Anthony M. Freed

Oracle Java, Apple QuickTime, and Adobe Reader lead the pack for the top ten most exposed software in the U.S., according to a new regional-based study of vulnerable and unpatched software deployed on PCs.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »