March 25, 2015 Added by:Anthony M. Freed
The Center for Strategic and International Studies (CSIS), a non-profit think tank which conducts research and analysis to develop policy initiatives, has issued a set of recommendations for Congress and the Obama Administration regarding the steps that should be taken in order to increase the level if threat information sharing between the government and private sector.
March 24, 2015 Added by:Eduard Kovacs
Researchers at the Ben Gurion University in Israel have demonstrated that two computers in close proximity to each other can communicate using heat emissions and built-in thermal sensors.
March 23, 2015 Added by:Tripwire Inc
Last week, the Internet fell over itself to report on a botnet allegedly comprised of 100,000 smart devices. Things. The Internet of Things had finally attacked!
March 19, 2015 Added by:Steve Durbin
The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.
March 18, 2015 Added by:Tripwire Inc
A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.
March 18, 2015 Added by:Anthony M. Freed
The vast majority of IT leaders in the retail and financial services sectors acknowledge that their organizations are extremely vulnerable to risks posed by insider threats, including those posed by employees, privileged users, and third party partners that are part of the business’s supply chain.
March 16, 2015 Added by:Peter Zavlaris
Hillary Clinton is in hot water for her decision to use a private email domain instead of her government-issued one when she was Secretary of State.
March 11, 2015 Added by:Anthony M. Freed
The Q4 2014 DDoS Trends Report (gated) reveals that the public sector is increasingly being targeted by distributed denial of service (DDoS) attacks.
March 11, 2015 Added by:Eduard Kovacs
Seagate has confirmed the existence of vulnerabilities in Business Storage 2-Bay NAS devices and promised to patch the issues in May.
March 11, 2015 Added by:Anton Chuvakin
We have SO much security data, how do we make sense of it?
March 09, 2015 Added by:Anton Chuvakin
Pardon the idiotic title, but some recent discussions around security analytics have made this question practically relevant.
March 04, 2015 Added by:Eduard Kovacs
The notorious Angler exploit kit has started leveraging a new technique to ensure that its malicious activities are not interrupted when the domains it uses are blacklisted, researchers at Cisco revealed on Tuesday.
March 04, 2015 Added by:Brent Huston
This article about research showing how malware could be hidden in Blu-Ray disks should serve as a reminder to us all that a lot of those “smart” and “Internet-enabled” devices we are buying can also be a risk to our information.
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015