October 27, 2014 Added by:InfosecIsland News
Please join us on Thursday, Oct. 30th at 1PM ET for a special webcast on how Gaps In SSH Security Create an Open Door for Attackers.
October 21, 2014 Added by:Patrick Oliver Graf
Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.
October 16, 2014 Added by:Brian Prince
A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.
October 14, 2014 Added by:Pierluigi Paganini
According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.
October 14, 2014 Added by:Rafal Los
Security is hard, folks.
October 09, 2014 Added by:Patrick Oliver Graf
For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.
October 08, 2014 Added by:Joe Weiss
I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.
Unintentional ICS Cyber Incidents Have Had Significant Impacts on Nuclear Plants – Why Aren’t they Being Addressed?
October 02, 2014 Added by:Joe Weiss
The NIST definition of a cyber incident as defined in FIPS PUB 200, Minimum Security Requirements for Federal Information and Information System, is electronic communications between systems or systems and people that impacts Confidentiality, Integrity, and/or Availability. The incident doesn’t have to bemalicious or targeted to be a cyber incident
October 02, 2014 Added by:Patrick Oliver Graf
The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.
September 26, 2014 Added by:InfosecIsland News
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
September 25, 2014 Added by:Malwarebytes
It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.
September 23, 2014 Added by:Wendy Nather
One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.
Network Security Dark Space: What You Don’... abdul bari Chanessra on 01-25-2015
Today's Mobile Device Data Protection Must G... asad ali on 01-25-2015
Wireless Home Technologies Create Security R... abdul bari Chanessra on 01-25-2015