Advertisement
Top

Tag: Protection


Network security

End-to-end network segmentation essential for security, yet few deploy

September 12, 2016

Via: Help Net Security

As point-of-sale breaches, ransomware attacks and various other customer data breaches continue to make local and national headlines, IT professionals agree that network segmentation – the ability to create secure, network-wide “swim lanes” for applications or services – is an […]


Vulnerabilities

Attackers don’t need vulnerabilities when the basics work just as well

August 22, 2016

Via: CSO Online

You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data. Josh Abraham, a practice […]


Privacy protection

How to protect yourself from common hotel security threats

August 4, 2016

Via: CSO Online

Hotels are digitally dangerous places these days. And that’s not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years. Most of the earliest reports pointed to surgical strikes on high-profile executives […]


Malware

Firefox Adds Improved Download Protection

August 3, 2016

Via: Security Week

Mozilla on Monday announced that download protection in Firefox 48 has been expanded to include potentially unwanted software and uncommon downloads. Mozilla introduced download protection two years ago in Firefox 31 on Windows, then added it to Mac and Linux releases […]


Malware, Threats & Malware, Virus & Malware

Android 7.0 beefs up ‘ransomware’ protection

July 7, 2016

Via: The Hill

The next release of Android’s operating system, code-named Nougat, will prevent malware from locking users’ screens, a Symantec researcher wrote on a corporate blog. Ransomware, a type of application that extorts victims by locking up data or devices, often works […]


Vulnerabilities

Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

June 29, 2016

Via: Security Intelligence

In the U.S., the transportation sector is defined to include a number of sub-sectors such as aviation, highway infrastructure, maritime transportation, mass transit and passenger rail, pipeline systems, freight rail, and postal and shipping. This is an extensive network of […]


Network security

When you isolate your industrial control systems don’t forget about DNS

June 10, 2016

Via: CSO Online

Many organizations that run industrial control systems strive to isolate them from the Internet, but sometimes forget to disallow Domain Name System (DNS) traffic, which provides a stealthy way for malware to exfiltrate data. Sometimes referred to as supervisory control […]


Malware

Email and Web Gateway: Your First Line of Defense Against Ransomware

May 20, 2016

Via: TrendMicro Blog

Ransomware is fast becoming the scourge of IT departments all over the world. It has risen over the past 12-24 months from a minor nuisance to a major threat – causing business disruption and damaging the brand and reputation of […]


Malware

Why a layered defense is your best protection against malware

April 21, 2016

Via: Help Net Security

As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In simplistic terms, a malware’s arrival on an endpoint takes a significant journey and trades […]


Network security

Protect your Supply Chain with a Third-Party Risk Management Program

March 16, 2016

Via: TrendMicro Blog

Over the last 20 years, technology advancements, globalization and the Internet have revolutionized business practices and efficiency. Supply chain management is one of the areas that has benefitted most, as companies can now work with suppliers and business partners around […]


Access control, Phishing

LastPass phishing attack could have scooped up passwords

January 18, 2016

Via: CIO

A relatively simple phishing attack could be used to compromise the widely used password manager LastPass, according to new research. Notifications displayed by LastPass version 4.0 in a browser window can be spoofed, tricking people into divulging their login credentials […]


Access control, Security

Congress struggles to secure nation’s power grid

November 27, 2015

Via: The Hill

Policymakers are searching for ways to defend the nation’s power grid from a major cyber-attack, amid concerns the industry’s digital defenses are dangerously lagging and underfunded. Security experts warn that energy companies, while attuned to the threat, are scrambling to […]


Editorial, Phishing, Security

Social engineering in cyber-attacks – how to protect your company

October 29, 2015

Via: Russel Edwards

In our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? […]


Access control

IRS enhances efforts to combat identity fraud, claiming upcoming tax season will be ‘more secure’

October 20, 2015

Via: access-control

The Internal Revenue Service and private tax preparers say they are beefing up efforts to limit tax-related #identity theft for the 2016 filing season, testing more than 20 new safeguards to protect taxpayers’ sensitive information. The #irs, state tax authorities […]


Cyber warfare

UK Boosts Cyber Security Investments: £860m Budget and New Cyber Demo Centre

July 21, 2015

Via: Cyber Warfare

The UK government plans to protect UK businesses against cyberattacks by investing £860 million until 2016. Authorities recently launched a plan to shield small businesses from cyber criminals and opened a new London-based Cyber Demonstration Centre. The new UK £1m […]


Network security

Google to Expand Use of Safe Browsing to Stop Unwanted Software

July 17, 2015

Via: network-security

Google is expanding the use of its Safe Browsing mechanism to warn users about a broader variety of unwanted software, in addition to the warnings they see regarding phishing pages, malware, and other threats. Safe Browsing is the service that […]


Access control

Understanding PCI compliance fines: Who is in charge of enforcing PCI?

July 16, 2015

Via: access-control

If your business stores, processes, or transmits data from payment cards, then you are subject to the requirements of the PCI DSS. This set of security controls is designed to help merchants combat data theft, protecting both consumers and merchants’ […]


Privacy protection

Organizational Doxing

July 10, 2015

Via: privacy-protection

Recently, WikiLeaks began publishing over half a million previously secret cables and other documents from the Foreign Ministry of Saudi Arabia. It’s a huge trove, and already reporters are writing stories about the highly secretive government. What Saudi Arabia is […]


Data loss

How to survive in the ‘Digital Amnesia’ world

July 1, 2015

Via: data-loss

Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone users can be called “unmindful” — at least, as compared […]


Cloud security

Swift adoption of cloud and mobile drives insider threats

June 9, 2015

Via: cloud-security

Bitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and #mobile devices, the inability to protect […]