Top

Tag: Featured


Network security, Privacy protection

Yahoo settles for $47 million in litigation following data breach of 3 billion accounts

September 19, 2018

Via: Hot for Security

Everyone remembers the Yahoo breach — it was simply historical and created mass hysteria at the time. The company ultimately confirmed in late 2017 that, following an alleged state-sponsored attack, all user accounts had been breached – that is 3 […]


Cloud security

The Security Costs of Cloud-Native Applications

September 19, 2018

Via: Dark Reading

More than 60% of organizations report the bulk of new applications are built in the cloud. What does this mean for security? Businesses are increasingly reliant on cloud-native applications despite the strong, broad perception that use of the cloud will […]


Mobile security, Vulnerabilities

CSS-Based Attack Causes iOS, macOS Devices to Crash

September 18, 2018

Via: Threat Post

The attack stems from a glitch in WebKit, an HTML layout browser engine in Apple’s Safari browser. A newly-revealed proof-of-concept attack can cause iOS devices to crash or restart with a mere 15 lines of code, a researcher disclosed over […]


Vulnerabilities

Privilege Escalation Vulnerability Found in Honeywell Android Computers

September 17, 2018

Via: Hot for Security

A total of 17 Honeywell handheld computers were recently found vulnerable to a privilege escalation bug that could enable attackers to fully compromise the device and its stored data. The remotely exploitable vulnerability (CVE-2018-14825) has been tagged as “Improper Privilege […]


Network security

The 7 Habits of Highly Effective Security Teams

September 17, 2018

Via: Dark Reading

Security requires smart people, processes, and technology. Too often, the “people” portion of the PPT equation is neglected. Worldwide spending on digital transformation technologies is expected to reach nearly $1.3 trillion this year, according to a forecast from IDC. But […]


Mobile security

Mobile Attack Rates Up 24% Globally, 44% in US

September 13, 2018

Via: Dark Reading

One-third of all fraud targets are mobile, a growing source of all digital transactions. The proportion of mobile-vs.-desktop transactions has nearly tripled in the last three years, and instances of mobile fraud and cyberattacks have grown as attackers go where […]


Network security

4 Practical Measures to Improve Election Security Now

September 12, 2018

Via: Dark Reading

It’s more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage. In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout […]


Identity theft, Phishing

Here’s Why Business Email Compromise Is Still Driving Executive Identity Theft

September 12, 2018

Via: Security Intelligence

All it took was access to a lawyer’s email, and suddenly, almost $532,000 was in the wrong hands. This business email compromise (BEC) scam began simply: A criminal in Los Angeles named Ochenetchouwe Adegor Ederaine, Jr. gained access to a […]


Cloud security

5 tips for better cloud security

September 11, 2018

Via: CSO Online

There’s no doubt that widespread adoption of the cloud has enabled collaboration on a much greater scale, driving innovation and creativity. Distributed workforces can work harmoniously, IT departments can offload expensive hardware and maintenance costs, and organizations can benefit from […]


Network security

LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company

September 10, 2018

Via: Securelist

Since March 2018 we have discovered several infections where a previously unknown Trojan was injected into the lsass.exe system process memory. These implants were injected by the digitally signed 32- and 64-bit network filtering driver NDISProxy. Interestingly, this driver is […]