September 19, 2016
Via: Security IntelligenceCyber-security is not thoroughly discussed in the context of Clinton’s national security platform. And aside from a reference to “working with tech companies” to fight online propaganda, intercept communications and track social media posts, cybersecurity doesn’t play a major factor […]
August 9, 2016
Via: SecurelistOver the last few years, the number of “APT-related” incidents described in the media has grown significantly. For many of these, though, the designation “APT”, indicating an “Advanced Persistent Threat”, is usually an exaggeration. With some notable exceptions, few of […]
July 27, 2016
Via: Security WeekMicrosoft is launching new Microsoft Authenticator applications next month in popular mobile app stores to provide users with multi-factor authentication (MFA) functionality on the go. MFA is the new trend among high-tech companies, and Microsoft is the latest to have […]
Vulnerabilities, Wireless security
July 22, 2016
Via: Security WeekManaged security risk assessment provider Digital Defense has identified several vulnerabilities in the Dell SonicWALL Global Management System (GMS), a platform that allows organizations to centrally manage their SonicWALL solutions. The vendor has released a hotfix to patch the issues. […]
July 21, 2016
Via: SC MagazineThe Guardian Project, a Tor Project contributor, has developed a way to keep the army of devices from toasters and refrigerators to lawn sprinklers and HVAC systems, from rising up at the behest of hackers and spilling sensitive data or […]
July 14, 2016
Via: Security WeekIndustrial cyber security startup Indegy announced on Wednesday that it has raised $12 million in Series A round of financing led by Vertex Ventures Israel. Indegy offers a platform that protects industrial control systems (ICS) from cyber, insider and operator […]
Application security, Vulnerabilities
June 28, 2016
Via: TrendMicro BlogTom’s Hardware contributor Lucian Armasu reported in early June that security researchers had pinpointed a vulnerability in both the web browser and mobile app version of Messenger that would provide certain malicious capabilities to hackers. Further research uncovered that the processes […]
Application security, Cloud security
June 23, 2016
Via: Dark ReadingMicrosoft is set to offer a new cloud-based service that lets businesses classify, label, and protect data at the time of creation or modification. That protection then stays with the data at all times, regardless of where it is stored, […]
May 3, 2016
Via: Threat PostPopular collaboration and communication firm Slack rushed to plugged a security hole in its platform Thursday that was leaking some of its users’ private chats and files for anyone to access. Slack, a leading tool used by companies to communicate […]
December 15, 2015
Via: Help Net SecurityAn ever-increasing number of organizations are turning to big data to gain valuable insight that can be immediately acted on to increase revenue, lower operating costs, or mitigate risk. For many companies, big data creates new, innovative opportunities and also […]
October 7, 2015
Via: malwareKaspersky Lab experts tracking the activity of the ####winnti group have discovered an active threat based on a 2006 #bootkit installer. The threat, which they name HDRoot after the original tool’s name HDD Rootkit, is a universal #platform for a […]
April 30, 2024
April 11, 2024
April 30, 2024