April 30, 2015 Added by:Malwarebytes
The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.
April 29, 2015 Added by:Anthony M. Freed
The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.
April 28, 2015 Added by:Peter Zavlaris
The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.
April 28, 2015 Added by:Robert Vamosi
Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.
April 23, 2015 Added by:Eduard Kovacs
According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.
April 22, 2015 Added by:Brian Prince
The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.
April 22, 2015 Added by:Tripwire Inc
Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.
April 19, 2015 Added by:Anthony M. Freed
Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.
April 17, 2015 Added by:Kasey Cross
Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.
April 16, 2015 Added by:Eduard Kovacs
With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.
April 15, 2015 Added by:Brian Prince
In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.
April 15, 2015 Added by:Mary Landesman
People differ in how they approach data analytics. One camp prefers to postulate a theory and find data that supports or negates that theory. Another camp prefers to let the data tell the story.
April 14, 2015 Added by:Joe Weiss
There is a tendency by many in the cyber security community to only care about malicious cyber attacks as opposed to unintentional cyber incidents.
April 13, 2015 Added by:Tripwire Inc
We have a problem in the security community – or maybe within the modern information age of humanity in general. That problem is we see security as a technology, policy, privacy or people issue, instead of an integrated combination thereof.
April 09, 2015 Added by:Anthony M. Freed
Analysis in the newly released 2015 Cyber Risk Report finds that 86% of web applications tested had serious issues with authentication, access control, and confidentiality, an increase over the previous year’s rate of 72%.
April 09, 2015 Added by:Peter Zavlaris
The current problem, however, is that while IT has scaled and made tremendous advancements over the last decade, security continues to lag behind.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015