Breaches

Bd07d58f0d31d48d3764821d109bf165

Microsoft Patching: Don’t Forget to Read the Fine Print

May 21, 2015 Added by:Tripwire Inc

During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Adobe Issued a Significant Update for Flash Player, Reader and Acrobat

May 14, 2015 Added by:Pierluigi Paganini

Adobe issued an update to fix 52 flaws in Flash Player, Reader and Acrobat products, that fortunately aren’t being publicly exploited in the wild.

Comments  (0)

0ead717779244d9aab5c1699308850d2

VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts

May 14, 2015 Added by:Brian Prince

Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Ten List of Most Exposed Software

May 12, 2015 Added by:Anthony M. Freed

Oracle Java, Apple QuickTime, and Adobe Reader lead the pack for the top ten most exposed software in the U.S., according to a new regional-based study of vulnerable and unpatched software deployed on PCs.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Serious Security Flaws Found in Hospira LifeCare Drug Pumps

May 06, 2015 Added by:Eduard Kovacs

Researchers have identified several critical vulnerabilities in Hospira LifeCare patient-controlled analgesia (PCA) infusion systems, which can be exploited by a remote attacker to take complete control of affected devices.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Scenario-based Training for Nuclear Power Plants Based on Actual Nuclear Plant Cyber Incidents

May 06, 2015 Added by:Joe Weiss

There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Flaws in WordPress eCommerce Plugin Expose Over 5,000 Websites

April 30, 2015 Added by:Eduard Kovacs

Researchers at High-Tech Bridge have identified several vulnerabilities in TheCartPress, an eCommerce plugin installed on more than 5,000 WordPress websites.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Cost of a Non-Malicious Control System Cyber Incident – More Than $1Billion

April 14, 2015 Added by:Joe Weiss

There is a tendency by many in the cyber security community to only care about malicious cyber attacks as opposed to unintentional cyber incidents.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Cybersecurity Trends for SMBs: Mobile, Security and the Cloud

April 10, 2015 Added by:Paul Lipman

While SMBs are vulnerable to many of the same types of attacks as the companies making headlines (Target, JP Morgan, Home Depot, Anthem, etc.), they must defend themselves with vastly smaller IT teams and budgets. SMBs are finding they have a unique set of challenges and vulnerabilities that require a comprehensive but tailored approach to security.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

It's Time to Change the Way We Think About the Internet

April 09, 2015 Added by:Peter Zavlaris

The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Control System Cyber Incidents and Why They are so Often Overlooked

April 09, 2015 Added by:Joe Weiss

Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

ICS Cyber Incidents – What Relevant Information Actually Exists?

April 02, 2015 Added by:Joe Weiss

There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Compromised WordPress Sites Launch Drive-by Attacks Off Pirate Bay Clone

April 01, 2015 Added by:Malwarebytes

WordPress, the leading Content Management System, is one of cyber criminals’ favourite target when it comes to hacking websites.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »