October 21, 2014 Added by:Patrick Oliver Graf
Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.
October 16, 2014 Added by:Brian Prince
A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.
October 14, 2014 Added by:Pierluigi Paganini
According to a new report issued by the cyber security firm iSIGHT Partners, a group of Russian hackers has been exploiting a previously unknown flaw in Microsoft’s Windows operating system to spy on NATO, the Ukrainian government, a U.S. university researcher and many other entities.
October 14, 2014 Added by:Rafal Los
Security is hard, folks.
October 09, 2014 Added by:Patrick Oliver Graf
For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security community into reaction mode.
October 08, 2014 Added by:Joe Weiss
I have a great concern about many people in nuclear (and other) industries only focusing on malicious cyber attacks to the exclusion of unintentional cyber incidents.
October 02, 2014 Added by:Patrick Oliver Graf
The world of IT is going through the same transition, away from the traditional support of “marathoning” to meet goals.
September 26, 2014 Added by:InfosecIsland News
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
September 25, 2014 Added by:Malwarebytes
It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.
September 23, 2014 Added by:Wendy Nather
One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.
September 16, 2014 Added by:Nate Kube
There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.
September 15, 2014 Added by:Joe Weiss
The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.
September 15, 2014 Added by:Greg Akers
Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.
Cyber-Criminals Quickly Adopt Critical Flas... Jerry Sommer on 10-25-2014
Cyber Security Careers: What You Need To Kno... Jerry Sommer on 10-25-2014
Q and A with Hacker "srblche srblchez"... chi nguyen on 10-25-2014