IDS/IDP

3caea4d9bcdd5cde2b1a1f338a06a086

Traffic Intelligence: Open vs. Closed Crowd-Sourced

May 21, 2015 Added by:Jonathan Curtis

This comparison is quite analogous to the differences I’ve experienced between simple threat feeds and premium threat intelligence offerings. I’ll let you draw your own conclusion as to how.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

The Logjam Attack: What You Need to Know

May 21, 2015 Added by:Malwarebytes

A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed on the web.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Shock Therapy for Medical Device Malware

May 20, 2015 Added by:Danny Lieberman

An enterprise hospital network is a dangerous place.

Comments  (0)

0ead717779244d9aab5c1699308850d2

DDoS Attacks Spiked in Q1 2015: Akamai

May 20, 2015 Added by:Brian Prince

The first quarter of the year set a record for the number of DDoS attacks observed across Akamai's Prolexic network, with the total number of attacks being more than double the number recorded in the first quarter of 2014.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

FBI Says Researcher Admitted Hacking Airplane in Mid-Flight

May 19, 2015 Added by:Eduard Kovacs

A researcher who specializes in aircraft security admitted hacking into an airplane’s systems during a flight and successfully sending a climb command to one of the engines, according to an FBI search warrant application.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Three Attack Vectors for SAP Systems

May 19, 2015 Added by:Anthony M. Freed

A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Three Attack Vectors for SAP Systems

May 19, 2015 Added by:Anthony M. Freed

A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

It’s NOT the Technology Failing, It’s the Provisioning

May 18, 2015 Added by:Tripwire Inc

Over the last year or so, it has become increasingly obvious that there is a uniformity related to technology failures, and more than one would be expected to encounter.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Networked Devices Fueling Rise in DDoS Reflection Attacks

May 14, 2015 Added by:Anthony M. Freed

Vulnerable network devices such as unprotected routers and printers are fueling an increase in the number and magnitude of distributed denial of service (DDoS) attacks, many of which are employing reflection amplification techniques.

Comments  (0)

0ead717779244d9aab5c1699308850d2

VENOM Bug Poison to Virtual Environments, Not Bigger Than Heartbleed: Experts

May 14, 2015 Added by:Brian Prince

Perhaps it is not surprising that any time a critical new bug appears comparisons to other notorious bugs come soon after.

Comments  (0)

1c7e19555c747737c9064d29ea238f27

When Your Surgeon Really Is a Hack

May 13, 2015 Added by:Robert Vamosi

There’s been a quiet revolution going on within hospitals, mostly in the United States.

Comments  (0)

B16fab97daa7df5ccd0d892c340b0541

Falling Off the End of the Cyber Kill Chain

May 11, 2015 Added by:Anup Ghosh

In our zeal to declare prevention dead, we should not lose sight that $1 spent on prevention is worth $1M in post-breach incident response.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Rombertik Strike at MBR Latest in Long Line of Malware Self-Defense Tactics

May 07, 2015 Added by:Brian Prince

The malware, known as Rombertik, is the latest in a long line of examples of malware designed to make the lives of analysts and researchers harder.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Scenario-based Training for Nuclear Power Plants Based on Actual Nuclear Plant Cyber Incidents

May 06, 2015 Added by:Joe Weiss

There have been more than 500 actual control system cyber incidents globally in multiple industries. The impacts have ranged from trivial to significant environmental releases to significant equipment damage to major cyber-related outages to deaths. Most of the incidents were not malicious and the vast majority were not identified as cyber.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »