Top

Category: Security


Cyber-crime, Security

A Lesson from Sun Tzu: Is Your Cybersecurity Strategy Sound, or Are You Just Making Noise?

September 6, 2017

Via: Aberdeen Essentials

Ransomware and large-scale DDoS attacks tend to steal the limelight when it comes to cybersecurity. The problem is that,while companies are focused on securing their networks against the latest threat, they tend to overlook a serious underlying flaw that has […]


Data loss, Security

Edith Wharton, Identity Theft, and the GDPR

September 6, 2017

Via: TrendMicro Blog

During one of my talks for Gartner, I asked the audience, “How many of you have ever had anything stolen?” Many hands went up. Then I asked, “How did you know it was stolen?” The answers generally offered, “I looked […]


Security, Threats & Malware

Who Is Marcus Hutchins?

September 6, 2017

Via: Krebs on Security

In early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in […]


Security, Threats & Malware

Week in review: Cyber threat hunting, Android DDoS botnet, drone bug bounty

September 5, 2017

Via: Help Net Security

Here’s an overview of some of last week’s most interesting news, podcasts and articles: New, custom ransomware delivered to orgs via extremely targeted emails Ransomware campaigns are usually wide-flung affairs: the attackers send out as many malicious emails as possible […]


Cyber warfare, Security

Why hackers are increasingly targeting electronic health records

April 4, 2017

Via: TrendMicro Blog

Over the past three years, the number of attacks on healthcare institutions have skyrocketed. In 2016, on average, at least one health data breach occurred every day, totaling in about 450 successful attacks over the course of the year, according to […]


Cyber-crime, Email security, Phishing, Security

Simple Gmail spoofing leaves users open to targeted attacks

February 10, 2017

Via: Help Net Security

Gmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come from a non-Gmail server. This fact can be misused by attackers who want to trick their targets into clicking […]


Network security, Security

The security impact of HTTPS interception in the wild

February 10, 2017

Via: Help Net Security

HTTPS deployment is on an upward trajectory, and this growth is accompanied by the increasing HTTPS interception and SSL inspection by enterprise-grade firewalls, web filters, gateways, as well as client-side antivirus and security solutions. These solutions have to be able […]


Application security, Security

Why you need a tailored application security program

February 9, 2017

Via: Help Net Security

For companies that provide applications to their customers, keeping those applications secure is a must. Setting up an application security program is the next logical step, but there are many choices to be made when trying to make it as […]


Access control, Security

Is your Webcam Spying on you?

February 8, 2017

Via: Zone Alarm

How many devices do you have with cameras around the house? You probably have some laptops, a few cell phones, perhaps a baby monitor, and maybe even a home surveillance system. Even though cameras are meant to enhance our devices […]


Access control, Security

It’s time to rethink using remote access VPNs for third-party access

February 7, 2017

Via: Help Net Security

No longer safely operating behind the traditional corporate perimeter, business productivity today depends on integrating external members of the extended enterprise into the work processes. This means giving access to critical business applications – a risky aspect of doing business […]