July 21, 2017
Via: CSO OnlineFor years, experts have warned about the danger of Internet of Thing devices, often built by companies on the cheap with little or no interest in building security into their products. Many of these insecure devices have found their ways into businesses, interacting and […]
May 26, 2017
Via: Panda SecurityThe US Congress decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, […]
May 19, 2017
Via: CSO OnlineDuring the past year, security concerns associated with Internet of Things (IoT) devices have come into sharper focus. Yet the security issues associated with one IoT sector – wearable devices – remain quite blurred. Organizations can’t afford to forget to include wearables […]
April 6, 2017
Via: CSO OnlineCertificate authorities (CAs) have given themselves a black eye lately, making it hard for users to trust them. Google stopped trusting Symantec after discovering the CA had mis-issued thousands of certificates over several years, and researchers found that phishing sites […]
March 22, 2017
Via: CIOThe debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation. But it hasn’t been settled – in some ways it is more intense […]
January 10, 2017
Via: Computer WeeklyIf we are talking DNS (domain name system), then we are talking risk. Using the internet to do business is a risk, an acceptable one for most, but still a risk. And the assumptions we make about business resilience when […]
November 22, 2016
Via: WiredLast month, the entire internet went down for a few hours. At least that’s what one of the biggest denial-of-service attacks in recent memory felt like to a lot of people. Sites from Netflix, Spotify, and Reddit to The New […]
October 31, 2016
Via: We Live SecurityNearly half a century ago, history was made with the ‘successful’ transmission of data between two computers in California. The letters ‘lo’ were sent – it should have been the world ‘login’, but that’s a moot point – establishing the basis […]
September 27, 2016
Via: Security AffairsWhat happens if someone shuts down the Internet? Is it possible? Our society heavily depends on technology and the Internet is the privileged vector of the information today. Blocking the Internet could paralyze countless services in almost any industry, from […]
September 6, 2016
Via: CSO OnlineLike mobile and cloud, blockchain — first implemented in the original source code of bitcoin in 2009 — stands poised to profoundly disrupt business. If it lives up to its promise, it won’t just be financial institutions that are disrupted. […]
Cyber warfare, Editorial, Malware
June 16, 2016
Via: Russel EdwardsIn late 2014 the American Association of Advertising Agencies (4A’s), Association of National Advertisers (ANA), and Interactive Advertising Bureau (IAB) created the New York-based Trustworthy Accountability Group (TAG) for the purpose of “eliminating fraudulent digital advertising traffic, combating malware, fighting […]
May 30, 2016
Via: MalwarebytesGraham Cluley drew my attention the other day to an issue that has apparently been known to some for years, but was new to me: clipboard poisoning, an issue where a website can replace what you think is on your clipboard with […]
May 25, 2016
Via: Naked SecurityWith password managers to take care of ch00sing c0MPl1c/\tEd p455WOrdz for us, and with two-factor authentication (2FA) to reduce the value of stolen or poorly-chosen passwords, you could argue that we no longer need to supplant passwords, because they’re easier […]
May 11, 2016
Via: Kaspersky BlogSocial networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality, a large investment is required. Like all investments, there is […]
May 5, 2016
Via: Russel EdwardsURL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly […]
September 9, 2015
Via: cyber-crimeResearchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control (C&C) servers by ISPs and law enforcement agencies – the use of #satellite-based […]
March 23, 2015
Via: data-lossAIR-GAPPED SYSTEMS, WHICH are isolated from the #internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make siphoning data from them difficult. Air-gapped systems […]
April 30, 2024
April 11, 2024
April 30, 2024