Network->General

E313765e3bec84b2852c1c758f7244b6

Patch for ShellShock ASAP!

September 30, 2014 Added by:Brent Huston

Source IPs for probes looking for the vulnerability are growing slowly in number and scope of scans. (As of 9/30/14, 10am Eastern).

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

New Bash Bug Could Wreak Havoc on Linux and OS X Systems

September 25, 2014 Added by:Malwarebytes

It would have been hard to imagine anything as bad as the HeartBleed bug was going to happen but the recent discovery of a flaw in the popular bash command shell very well could be.

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

A Tenuous Grasp on Reality

September 23, 2014 Added by:Wendy Nather

One thing that has bothered me for years is the tendency for security recommendations to lean towards the hypothetical or the ideal. Yes, many of them are absolutely correct, and they make a lot of sense. However, they assume that you're starting with a blank slate.

Comments  (1)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Cyber Security and the Electric Grid – It IS a Problem

September 15, 2014 Added by:Joe Weiss

The electric grid has been, and continues to be, susceptible to unintentional and malicious cyber incidents.

Comments  (9)

B42221fcb8abc51212416aab3b29468f

Using Network Intelligence to Turn the Table on Hackers

September 15, 2014 Added by:Greg Akers

Teams that use intelligence inherent in the network will gain insight into how cyber actors operate and how to quickly shut them down.

Comments  (0)

F45df53d99605d46f5ae32b7bed9fe22

The JPMorgan Chase Breach: How Are Hackers Stealing Your Credentials?

September 11, 2014 Added by:Thu Pham

If you needed more proof that authentication attacks are on the rise, look no further than the recent JP Morgan Chase data breach.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

CERT Pudding and the War on Bad SSL

September 10, 2014 Added by:Tripwire Inc

SSL implementation problems exist in apps of all shapes, sizes and function, ranging from those with little sensitive data and few users to apps with millions of active users handling some of our most sensitive data, such as financial transactions and account login information.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Who Will Foot the Bill for BYOD?

September 10, 2014 Added by:Patrick Oliver Graf

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or, they access the corporate network remotely, from home or while on-the-go. BYOD and remote access have always seemed like a win-win arrangement – employers pay less hardware costs and employees g...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Brazilian Cyber Criminals Targeting Home Routers

September 03, 2014 Added by:Pierluigi Paganini

Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack.

Comments  (0)

9ef2480a65cde87091d69a3b8a7fec3a

Why What You Don’t Know, May Hurt You

August 28, 2014 Added by:Stephen Dodson

We are no longer dealing with teenage hackers or disgruntled young adults with a political or social ax to grind. The real threat to your security comes from advanced cybercriminal organizations.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Thousands of Vulnerabilities in NOAA Satellite System

August 27, 2014 Added by:Dan Dieterle

According to the report, a security audit of NOAA’s Information Technology security program found serious security issues with the JPSS Ground System which gathers information from weather satellites and provides it to worldwide users.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

B689dd1362bef7eb372a540d3b6e6287

Preparing for a Successful IAM Integration Project (Part 2 of 2)

August 21, 2014 Added by:Identropy

An identity management implementation project will often extend 18-36 months based on the size and complexity of the organization. This is an extraordinary amount of time for any project sponsor to maintain passion around the project.

Comments  (3)

201d6e4b7cd0350a1a9ef6e856e28341

NERC CIPS and Keeping Lights On – Are They the Same?

August 21, 2014 Added by:Joe Weiss

August 19th, I spent a day with the NERC Critical Infrastructure Protection (CIP) Version 5 Drafting team working on one of the NERC CIP Standards. The focus was on boundary protection, not on the actual control system devices and serial communications which were explicitly excluded.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »