Breaches

E595c1d49bf4a26f8e14ce59812af80e

What Network Security Lessons Can We Learn from the Sony Attack?

December 17, 2014 Added by:Patrick Oliver Graf

Hollywood is a place that can be driven mad by star-studded gossip, where the talk of the town is rarely private and where people are accustomed to their secrets not staying secret for very long. Yet, this state of play hasn’t made it any easier for the victims of last month's cyberattack against Sony, carried out by shadowy assailants calling themselves the Guardians of Peace.

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Grinch Bug Could be Worse Than Shellshock, Says Experts

December 17, 2014 Added by:Pierluigi Paganini

The flaw resides in the authorization system in Linux which allows privilege escalation through the wheel.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

F45df53d99605d46f5ae32b7bed9fe22

The Cost of a Data Breach in 2014: An Industry by Industry Breakdown

December 04, 2014 Added by:Thu Pham

The average total cost of a data breach increased 15 percent in 2014 to $3.5 million, this according to the Ponemon Institute’s 2014 Cost of Data Breach Study: Global Analysis. But how does that average vary from industry to industry, each with different types of consumer information and different data regulations?

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Iran Attacking Critical Infrastructures - Cylance Report

December 04, 2014 Added by:Joe Weiss

This is not an “I told you so” note. It is a note expressing concern that our critical infrastructure organizations such as NERC, FERC, NRC, NEI, AWWA, and others do not appear to be taking this threat seriously.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

The Three Human Failures Behind Remote Access Shortcomings

November 26, 2014 Added by:Patrick Oliver Graf

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

3 Internet of Things Security Nuances You May Not Have Considered

November 25, 2014 Added by:Tripwire Inc

There’s a lot of work to do, but we’re at least focused on giving IoT a fair shot at being the poster child of security and not the antithesis of it.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

The Arrogance of the US Nuclear Power Industry - We Don't Want to Look at Everything

November 17, 2014 Added by:Joe Weiss

In today’s environment with nuclear plants being prime cyber targets, industry should be looking at more not less.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Data Breaches are a Global Problem

November 06, 2014 Added by:Brent Huston

For those of you who maybe just thought that data breaches were only happening against US companies, and only by a certain country as the culprit, we wanted to remind you that this certainly isn’t so.

Comments  (3)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Why Do Security Testing of Internal Computer Networks?

November 03, 2014 Added by:Brent Huston

It is true that the most attacks against information systems come from external attackers, but that does not mean the internal threat is negligible.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

The Power Industry Has Unique Technical Needs in Addressing Cyber Security - NOT!

November 03, 2014 Added by:Joe Weiss

I am very concerned about those statements concerning the uniqueness of the power industry because I do not believe it is unique except for addressing compliance requirements set forth in the NERC CIPs.

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Distinguishing Acts of War in Cyberspace

October 27, 2014 Added by:Stefano Mele

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

NIST warns on Zero-Day flaw in Samsung FindMyMobile

October 27, 2014 Added by:Pierluigi Paganini

The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »