Advertisement
Top

Tag: Internet


Network security

7 tips to secure against IoT cyberthreats

July 21, 2017

Via: CSO Online

For years, experts have warned about the danger of Internet of Thing devices, often built by companies on the cheap with little or no interest in building security into their products. Many of these insecure devices have found their ways into businesses, interacting and […]


Privacy protection

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

May 26, 2017

Via: Panda Security

The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, […]


Mobile security

Do wearables increase cyber risk for business?

May 19, 2017

Via: CSO Online

During the past year, security concerns associated with Internet of Things (IoT) devices have come into sharper focus. Yet the security issues associated with one IoT sector – wearable devices – remain quite blurred. Organizations can’t afford to forget to include wearables […]


Application security

Know the limits of SSL certificates

April 6, 2017

Via: CSO Online

Certificate authorities (CAs) have given themselves a black eye lately, making it hard for users to trust them. Google stopped trusting Symantec after discovering the CA had mis-issued thousands of certificates over several years, and researchers found that phishing sites […]


Cyber warfare

Critical infrastructure: Off the web, out of danger?

March 22, 2017

Via: CIO

The debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation. But it hasn’t been settled – in some ways it is more intense […]


Vulnerabilities

Security Think Tank: Know the business risks of using the internet

January 10, 2017

Via: Computer Weekly

If we are talking DNS (domain name system), then we are talking risk. Using the internet to do business is a risk, an acceptable one for most, but still a risk. And the assumptions we make about business resilience when […]


Network security

Oracle Just Bought Dyn, the Company That Brought Down the Internet

November 22, 2016

Via: Wired

Last month, the entire internet went down for a few hours. At least that’s what one of the biggest denial-of-service attacks in recent memory felt like to a lot of people. Sites from Netflix, Spotify, and Reddit to The New […]


Cyber warfare

International Internet Day: A great network targeted by cybercriminals

October 31, 2016

Via: We Live Security

Nearly half a century ago, history was made with the ‘successful’ transmission of data between two computers in California. The letters ‘lo’ were sent – it should have been the world ‘login’, but that’s a moot point – establishing the basis […]


Cyber warfare

A nation-state actor is testing methods for a massive takedown of the Internet

September 27, 2016

Via: Security Affairs

What happens if someone shuts down the Internet? Is it possible? Our society heavily depends on technology and the Internet is the privileged vector of the information today. Blocking the Internet could paralyze countless services in almost any industry, from […]


Network security, Security

How blockchain will disrupt your business

September 6, 2016

Via: CSO Online

Like mobile and cloud, blockchain — first implemented in the original source code of bitcoin in 2009 — stands poised to profoundly disrupt business. If it lives up to its promise, it won’t just be financial institutions that are disrupted. […]


Cyber warfare, Editorial, Malware

Stopping online advertising fraud once and for all

June 16, 2016

Via: Russel Edwards

In late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, combating malware, fighting […]


Virus & Malware

Clipboard poisoning attacks on the Mac

May 30, 2016

Via: Malwarebytes

Graham Cluley drew my attention the other day to an issue that has apparently been known to some for years, but was new to me: clipboard poisoning, an issue where a website can replace what you think is on your clipboard with […]


Network security

Can Google replace passwords by tracking you more thoroughly?

May 25, 2016

Via: Naked Security

With password managers to take care of ch00sing c0MPl1c/\tEd p455WOrdz for us, and with two-factor authentication (2FA) to reduce the value of stolen or poorly-chosen passwords, you could argue that we no longer need to supplant passwords, because they’re easier […]


Network security

Who’s tracking you on the Web?

May 11, 2016

Via: Kaspersky Blog

Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality, a large investment is required. Like all investments, there is […]


Editorial, Vulnerabilities

Fast&dangerous: do you know the risks of URL shorteners?

May 5, 2016

Via: Russel Edwards

URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly […]


Cyber-crime

Russian spy gang hijacking satellite links to pilfer data

September 9, 2015

Via: cyber-crime

Researchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control (C&C) servers by ISPs and law enforcement agencies – the use of #satellite-based […]


Data loss

Stealing Data From Computers Using Heat

March 23, 2015

Via: data-loss

  AIR-GAPPED SYSTEMS, WHICH are isolated from the #internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make siphoning data from them difficult. Air-gapped systems […]