Network Security


By All Means, Do as Little as Possible

May 04, 2015 Added by:PCI Guru

I write this because I have had enough of arguing over the lowest common denominator when it comes to securing networks, servers and applications.

Comments  (0)


RSA 2015: Rise of Chaos!!

May 04, 2015 Added by:Anton Chuvakin

Here is my traditional RSA (#RSAC) reflection post for RSA 2015 Conference – all my personal opinions/impressions/thoughts, of course.

Comments  (0)


Password Alert for Chrome, and other Extensions

April 30, 2015 Added by:Malwarebytes

The extension, which only becomes functional once you’ve signed into your Google account, will throw up the metaphorical emergency flares whenever it notices you’ve entered your credentials into a rogue website.

Comments  (0)


New Vulnerabilities Identified in Network Time Protocol Daemon (NTPD)

April 29, 2015 Added by:Anthony M. Freed

The Network Time Foundation’s NTP Project has released updates addressing multiple vulnerabilities discovered in NTPD, where exploitation by an attacker could result in a man-in-the-middle attack or cause a denial of service condition.

Comments  (0)


RSA Wrap-Up: There's a Dark Cloud Looming Over Information Security

April 28, 2015 Added by:Peter Zavlaris

The dark cloud looming over the information security industry at this year’s RSA Conference was unmistakable. The questions about whether security is on the right path continue to echo loudly.

Comments  (0)


First Lose the “Cyber” – Then We Can Talk

April 28, 2015 Added by:Robert Vamosi

Cyber is derived from the Greek word meaning skilled in steering or governing, neither of which directly apply to the Internet which is decentralized by design and therefore cannot be directly steered nor governed. The Internet is a resilient network of free-flowing information and data.

Comments  (0)


CozyDuke APT Behind White House, State Department Attacks: Kaspersky

April 23, 2015 Added by:Eduard Kovacs

According to the security firm, CozyDuke shares similarities with components spotted in previously documented APTs such as MiniDuke, CosmicDuke and OnionDuke.

Comments  (0)


Security of Internet of Things in Spotlight at RSA Conference

April 22, 2015 Added by:Brian Prince

The security challenges posed by the growth of the Internet of Things (IoT) are far from hypothetical - a point being hammered home here at the RSA Conference in San Francisco.

Comments  (0)


How to Protect Yourself From Caller ID Spoofing

April 22, 2015 Added by:Tripwire Inc

Has an auto-dialer or telemarketer ever tried to scam you? Have you noticed that the numbers of certain incoming calls don’t seem accurate? If you have answered yes to any of these questions, you might have seen a spoofed caller ID.

Comments  (0)


Weak SOHO Router Default Passwords Leave Tens-of-Thousands at Risk

April 19, 2015 Added by:Anthony M. Freed

Security researcher Viktor Stanchev has publicly disclosed that Bell’s SOHO modem/routers are shipped with extremely weak default passwords that can be cracked in a matter of days, leaving tens-of thousands of users at risk of network intrusions and sensitive data loss.

Comments  (0)


The Current State of Insecurity: Strategies for Inspecting SSL Traffic

April 17, 2015 Added by:Kasey Cross

Encrypted network traffic improves confidentiality and message integrity, but it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. Attackers are wising up and taking advantage of this gap in corporate defenses.

Comments  (0)


Preview: Suits and Spooks London - May 6-7, 2015

April 16, 2015 Added by:Eduard Kovacs

With less than three weeks to go until Suits and Spooks London 2015 kicks off, the agenda is nearly finalized. Our first 2-day international event will host experts in cyber warfare, intelligence, advanced persistent threats, sophisticated malware, and political issues.

Comments  (0)


Healthcare Industry Challenged by Data Breaches, Compliance

April 15, 2015 Added by:Brian Prince

In a new report from Vormetric focused on healthcare organizations, almost half (48 percent) of the IT decision makers from the U.S. said their organization either failed a compliance audit or experienced a data breach in the last year.

Comments  (0)


What Threat Intelligence Data Can Tell Us: The Sad Story of WF

April 15, 2015 Added by:Mary Landesman

People differ in how they approach data analytics. One camp prefers to postulate a theory and find data that supports or negates that theory. Another camp prefers to let the data tell the story.

Comments  (0)


The Cost of a Non-Malicious Control System Cyber Incident – More Than $1Billion

April 14, 2015 Added by:Joe Weiss

There is a tendency by many in the cyber security community to only care about malicious cyber attacks as opposed to unintentional cyber incidents.

Comments  (0)


10 Steps to Improve Your Layered Defense Strategy

April 13, 2015 Added by:Tripwire Inc

We have a problem in the security community – or maybe within the modern information age of humanity in general. That problem is we see security as a technology, policy, privacy or people issue, instead of an integrated combination thereof.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »