Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)


It's Time to Change the Way We Think About the Internet

April 09, 2015 Added by:Peter Zavlaris

The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.

Comments  (0)


Control System Cyber Incidents and Why They are so Often Overlooked

April 09, 2015 Added by:Joe Weiss

Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.

Comments  (0)


ICS Cyber Incidents – What Relevant Information Actually Exists?

April 02, 2015 Added by:Joe Weiss

There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.

Comments  (0)


Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)


Should Infosec Professionals Hack To Understand the Mind of the Attacker?

March 31, 2015 Added by:Tripwire Inc

To anticipate where and how an attacker might strike next, security professionals are realizing the importance of being able to understand the mind of the attacker and what they value in a target.

Comments  (0)


The Government Says It Has a Policy on Disclosing Zero-Days, But Where Are the Documents to Prove It?

March 30, 2015 Added by:Electronic Frontier Foundation

Despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.

Comments  (0)


Health Insurance Firmly in the Crosshairs

March 23, 2015 Added by:Peter Zavlaris

Premera Blue Cross is the latest victim of what appears to be a long-term APT perpetrated by China. Between CHS, Anthem and now Premera Blue Cross, it’s now safe to say health insurance is firmly in the cross hairs of powerful nation state actors.

Comments  (0)


Crouching Yeti APT Actor Still Targeting Industrial Sectors: Kaspersky

March 18, 2015 Added by:Eduard Kovacs

The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.

Comments  (0)


Taking Advantage of Critical Infrastructure Cybersecurity

March 18, 2015 Added by:Tripwire Inc

A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.

Comments  (0)


Grabbing Passwords from Memory using Procdump and Mimikatz

March 17, 2015 Added by:Dan Dieterle

When I was working on my Pulling Remote Word Documents from RAM using Kali Linux article, I was curious if you could use the same technique to pull the system passwords, and you can…

Comments  (3)


NAIC Cyber Security Principles – Not for Industrial Control Systems

March 17, 2015 Added by:Joe Weiss

There is still a significant gap in understanding of industrial control system (ICS) cyber security by many in the insurance industry.

Comments  (3)


Clinton Email Server Vulnerable for 3 Months: Venafi

March 12, 2015 Added by:Brian Prince

Access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term, research from security firm Venafi has found.

Comments  (4)


It’s Friends and Family Breaching Patient Privacy – Not Estonian Hackers

March 12, 2015 Added by:Danny Lieberman

A 2011 HIPAA patient privacy violation in Canada, where an imaging technician accessed the medical records of her ex-husband’s girlfriend is illustrative of unauthorized disclosure of patient information by authorized people.

Comments  (0)


Decide What Starts Automatically On Your PC

March 10, 2015 Added by:Neohapsis

The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.

Comments  (2)


Financial Malware Fell in 2014 As Takedown Operations Have Impact

March 05, 2015 Added by:Brian Prince

One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.

Comments  (14)

Page « < 2 - 3 - 4 - 5 - 6 > »