September 12, 2016
Via: Help Net SecurityAs point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network segmentation – the ability to create secure, network-wide “swim lanes” for applications or services – is an […]
August 22, 2016
Via: CSO OnlineYou might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data. Josh Abraham, a practice […]
August 4, 2016
Via: CSO OnlineHotels are digitally dangerous places these days. And that’s not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years. Most of the earliest reports pointed to surgical strikes on high-profile executives […]
August 3, 2016
Via: Security WeekMozilla on Monday announced that download protection in Firefox 48 has been expanded to include potentially unwanted software and uncommon downloads. Mozilla introduced download protection two years ago in Firefox 31 on Windows, then added it to Mac and Linux releases […]
Malware, Threats & Malware, Virus & Malware
July 7, 2016
Via: The HillThe next release of Android’s operating system, code-named Nougat, will prevent malware from locking users’ screens, a Symantec researcher wrote on a corporate blog. Ransomware, a type of application that extorts victims by locking up data or devices, often works […]
June 29, 2016
Via: Security IntelligenceIn the U.S., the transportation sector is defined to include a number of sub-sectors such as aviation, highway infrastructure, maritime transportation, mass transit and passenger rail, pipeline systems, freight rail, and postal and shipping. This is an extensive network of […]
June 10, 2016
Via: CSO OnlineMany organizations that run industrial control systems strive to isolate them from the Internet, but sometimes forget to disallow Domain Name System (DNS) traffic, which provides a stealthy way for malware to exfiltrate data. Sometimes referred to as supervisory control […]
May 20, 2016
Via: TrendMicro BlogRansomware is fast becoming the scourge of IT departments all over the world. It has risen over the past 12-24 months from a minor nuisance to a major threat – causing business disruption and damaging the brand and reputation of […]
April 21, 2016
Via: Help Net SecurityAs long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In simplistic terms, a malware’s arrival on an endpoint takes a significant journey and trades […]
March 16, 2016
Via: TrendMicro BlogOver the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around […]
January 18, 2016
Via: CIOA relatively simple phishing attack could be used to compromise the widely used password manager LastPass, according to new research. Notifications displayed by LastPass version 4.0 in a browser window can be spoofed, tricking people into divulging their login credentials […]
November 27, 2015
Via: The HillPolicymakers are searching for ways to defend the nation’s power grid from a major cyber-attack, amid concerns the industry’s digital defenses are dangerously lagging and underfunded. Security experts warn that energy companies, while attuned to the threat, are scrambling to […]
October 29, 2015
Via: Russel EdwardsIn our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? […]
October 20, 2015
Via: access-controlThe Internal Revenue Service and private tax preparers say they are beefing up efforts to limit tax-related #identity theft for the 2016 filing season, testing more than 20 new safeguards to protect taxpayers’ sensitive information. The #irs, state tax authorities […]
July 21, 2015
Via: Cyber WarfareThe UK government plans to protect UK businesses against cyberattacks by investing £860 million until 2016. Authorities recently launched a plan to shield small businesses from cyber criminals and opened a new London-based Cyber Demonstration Centre. The new UK £1m […]
July 17, 2015
Via: network-securityGoogle is expanding the use of its Safe Browsing mechanism to warn users about a broader variety of unwanted software, in addition to the warnings they see regarding phishing pages, malware, and other threats. Safe Browsing is the service that […]
July 16, 2015
Via: access-controlIf your business stores, processes, or transmits data from payment cards, then you are subject to the requirements of the PCI DSS. This set of security controls is designed to help merchants combat data theft, protecting both consumers and merchants’ […]
July 10, 2015
Via: privacy-protectionRecently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It’s a huge trove, and already reporters are writing stories about the highly secretive government. What Saudi Arabia is […]
July 1, 2015
Via: data-lossConnected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone users can be called “unmindful” — at least, as compared […]
June 9, 2015
Via: cloud-securityBitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and #mobile devices, the inability to protect […]