Advertisement
Top

Tag: Defense


Cyber warfare, Cyber-crime

Is the Taliban a Cyber Threat to the West?

September 9, 2021

Via: Security Week

Two decades ago, the U.S. and its allies invaded Afghanistan as retribution for the 9/11 terrorist attacks carried out by the al-Qaeda terror group. The Taliban, who had harbored al-Qaeda in Afghanistan, was forced out of government. Now, 20 years […]


Editorial

Why Is Mobile Threat Defense a Necessity for Enterprises?

March 10, 2019

Via: James Hughes

Mobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. […]


Network security, Threats & Malware

U.S. Defense, Critical Infrastructure Companies Targeted in New Threat Campaign

December 13, 2018

Via: Dark Reading

McAfee finds malware associated with ‘Operation Sharpshooter’ on systems belonging to at least 87 organizations. A cyberthreat group using malware tied to the Sony Pictures hack of late 2014 is attacking nuclear, defense, energy, and financial companies in what appears […]


Mobile security, Network security

Lawmakers take aim at Chinese tech giants in defense bill

May 18, 2018

Via: The Hill

Lawmakers are trying to use the must-pass National Defense Authorization Act (NDAA) to take a hard-line stance against Chinese technology in U.S. markets. On Thursday, several lawmakers attempted to insert amendments into the fiscal 2018 NDAA aimed at keeping products […]


Network security

Achieving More Effective Security With Collaborative Defense in Depth

May 17, 2018

Via: Security Intelligence

The cybersecurity industry today remains fragmented, with some organizations having as many as 85 security tools from 45 different vendors. Many of these technologies have been acquired over multiple years to address specific challenges across the complex threat landscape. Each […]


Hacker, Malware

Defense contractors face more aggressive ransomware attacks

April 13, 2018

Via: The Hill

Cybersecurity experts say defense contractors are facing more aggressive attacks as nation states and other hacking groups increasingly use malicious software to block information or manipulate data. The companies that provide U.S. military and intelligence agencies with products and services […]


Network security

IoT Security: The Cold, Hard Truth About Digital Device Defense

November 27, 2017

Via: Security Intelligence

With the IoT market on track to reach $800 billion this year and more than 2 billion connected devices already in the wild, it’s no surprise that Internet of Things (IoT) security is now a top priority for cutting-edge enterprises. […]


Vulnerabilities

New Rowhammer Attack Bypasses Existing Defenses

October 6, 2017

Via: Security Week

A group of security researchers has discovered a new type of attack that can exploit the Rowhammer vulnerability in DRAM chips that was uncovered several years ago, effectively bypassing existing defenses. In a newly published paper (PDF), eight researchers from […]


Virus & Malware

Defending Against The Rising Threat of “Non-malware” Attacks

December 23, 2016

Via: Security Week

Severe non-malware attacks and ransomware are the two stand-out malicious behaviors of 2016. When combined, as they have been with the PowerWare extortion, the attack can be both dangerous and difficult to detect. Carbon Black analyzed data from more than […]


Data loss

Nuclear power, defense workers leaking data through unsecure pagers

October 28, 2016

Via: The Hill

Nuclear power plants, chemical plants, defense contractors and other highly sensitive industries and workers are leaking information through their pagers, a new report shows. Pagers have been out of vogue with the public since the rise of the cellphone but are […]


Threats & Malware

Five emerging trends impacting the IT consulting services market

October 26, 2016

Via: Help Net Security

The top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote working environments Increase in service offshoring Increase in market consolidation Rise in use of cloud-based IT infrastructure. […]


Cyber warfare

Enterprises outsmarting themselves with security, while attackers easily use common techniques

October 13, 2016

Via: InfoWorld

Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on an analysis of nearly 4 million breach methods. Security professionals are figuring out how to […]


Network security

Carper pushes DHS for elections to be classified critical infrastructure

August 10, 2016

Via: The Hill

Sen. Tom Carper (D-Del), the ranking member of the Senate Homeland Security Committee, is pushing the Department of Homeland Security to reclassify elections as critical infrastructure. In a letter sent Monday to DHS Secretary Jeh Johnson, Carper writes “Designating election […]


Malware, Virus & Malware

To stop ransomware, opt for app graylisting and admin rights removal

August 4, 2016

Via: Help Net Security

CyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common infection, encryption and removal characteristics, and identify potential strategies for mitigating the impact of ransomware […]


Malware

Email and Web Gateway: Your First Line of Defense Against Ransomware

May 20, 2016

Via: TrendMicro Blog

Ransomware is fast becoming the scourge of IT departments all over the world. It has risen over the past 12-24 months from a minor nuisance to a major threat – causing business disruption and damaging the brand and reputation of […]


Malware

Invisible skimmers at the ATMs

May 18, 2016

Via: Kaspersky Blog

If you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order to keep your bank card safe. You need to watch […]


Malware

Why a layered defense is your best protection against malware

April 21, 2016

Via: Help Net Security

As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In simplistic terms, a malware’s arrival on an endpoint takes a significant journey and trades […]


Malware

How to stay safe from Ransomware?

April 14, 2016

Via: Zone Alarm

Ransomware started out as little more than an obnoxious practical joke, created by the not-so-stable biology professor Dr. Joseph Popp in 1989, when he distributed diskettes that supposedly contained Aids education software,  but in fact contained a virus that locked […]


Cyber warfare, Cyber-crime

Security Training for Incident Handlers: What’s Out There?

March 11, 2016

Via: Security Intelligence

Information technology, and especially information security, is a quickly evolving playing field. Those working in incident handling and incident response always need to stay on top of what’s new and what is trending in their area of expertise. By attending […]


Cyber warfare, Cyber-crime

Why SMBs should build a threat intelligence program — no tech investment required

February 11, 2016

Via: Tech Republic

As with anything techy, terms like “threat intelligence” have myriad definitions. For our purposes, let’s use Gartner’s description: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to […]