Network Security

6d117b57d55f63febe392e40a478011f

Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)

52ff7cf6fd88aebfb48b323e6251cd95

The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Healthcare Industry Challenged by Data Breaches, Compliance

April 15, 2015 Added by:Brian Prince

In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.

Comments  (0)

2d84e74c0a40157cd7d83753045dfb96

What Threat Intelligence Data Can Tell Us: The Sad Story of WF

April 15, 2015 Added by:Mary Landesman

People differ in how they approach data analytics. One camp prefers to postulate a theory and find data that supports or negates that theory. Another camp prefers to let the data tell the story.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

The Cost of a Non-Malicious Control System Cyber Incident – More Than $1Billion

April 14, 2015 Added by:Joe Weiss

There is a tendency by many in the cyber security community to only care about malicious cyber attacks as opposed to unintentional cyber incidents.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

10 Steps to Improve Your Layered Defense Strategy

April 13, 2015 Added by:Tripwire Inc

We have a problem in the security community – or maybe within the modern information age of humanity in general. That problem is we see security as a technology, policy, privacy or people issue, instead of an integrated combination thereof.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Majority of Apps Have Serious Security Issues

April 09, 2015 Added by:Anthony M. Freed

Analysis in the newly released 2015 Cyber Risk Report finds that 86% of web applications tested had serious issues with authentication, access control, and confidentiality, an increase over the previous year’s rate of 72%.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

It's Time to Change the Way We Think About the Internet

April 09, 2015 Added by:Peter Zavlaris

The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Control System Cyber Incidents and Why They are so Often Overlooked

April 09, 2015 Added by:Joe Weiss

Cyber security is now a very hot subject. However, the discussions are about IT cyber security and data breaches not control system cyber security and equipment damage.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Lazy Remediation Leaves Most Global 2000 Firms Vulnerable After Heartbleed Flaw: Report

April 08, 2015 Added by:Mike Lennon

As we mark the one-year anniversary of disclosure of the now famous OpenSSL vulnerability (CVE-2014-0160) known as Heartbleed, security firm Venafi has released new research that shows how vulnerable Global 2000 organizations still are as a result of the flaw.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

The Cloud is Covered: VPNs Enhance Data Security in the Cloud

April 08, 2015 Added by:Patrick Oliver Graf

A cloud provider that has to adhere to stringent privacy and compliance regulations typically has more know-how and access to more resources than a small- or medium-size company. But it is just not possible to rely on a cloud provider for every aspect of data security.

Comments  (0)

8f7b2d9100577f77aa8fbb4f51c0366e

Rethinking the Cyber Kill Chain

April 02, 2015 Added by:Invincea

While the underlying framework and conclusions are excellent, there are few entities capable of fully implementing defenses against all aspects of the cyber kill chain for multiple reasons

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

ICS Cyber Incidents – What Relevant Information Actually Exists?

April 02, 2015 Added by:Joe Weiss

There is a need to use the knowledge from previous control system cyber incidents when developing cyber forensics and monitoring technologies, cyber security technologies, training, and to adjust requirements such as the NERC CIPs, Regulatory Guide 5.71/NEI-0809, and CFATS to address what has actually been happening.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

China Uses Unencrypted Websites to Hijack Browsers in GitHub Attack

April 02, 2015 Added by:Electronic Frontier Foundation

Over the past few weeks, China has been using its country's Internet infrastructure to attack political opponents by turning normal users' web browsers into Denial of Service tools.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

mDNS Can Be Used to Amplify DDoS Attacks: Researcher

April 01, 2015 Added by:Eduard Kovacs

A researcher has determined that this behavior can be exploited for information disclosure and amplifying distributed denial-of-service (DDoS) attacks.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked