February 28, 2017
Via: The Hacker NewsCloudflare reported last night a bug in their service which could have leaked information from the services using their edge cache servers. Feedly uses Cloudflare as a security shield which increases the reliability and performance of the Feedly web application. As […]
February 14, 2017
Via: Security WeekA new survey of American adults’ perceptions of cybersecurity and hackers shows both a generational and a gender divide in attitudes. Young adults often display a more pragmatic approach compared to a more hardline attitude from older Americans, while there […]
Threats & Malware, Vulnerabilities
February 8, 2017
Via: Help Net SecurityA new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based Security eclipsed the total covered by the CVE and National Vulnerability Database (NVD) by […]
February 3, 2017
Via: Naked SecurityCisco has released the 10th of its annual cybersecurity reports, leading some publications to scream that security breaches can cost businesses 20% of their annual turnover. If you burrow into the headlines, however, it becomes apparent that only a third of […]
February 2, 2017
Via: Dark ReadingSpam spikes, and nearly three-fourths of all organizations worldwide have suffered adware-borne infections, according to Cisco’s annual cybersecurity report. Spam now accounts for 65% of all email worldwide, and up to one-fifth of spam is malicious, according to new data […]
January 20, 2017
Via: Help Net SecurityA recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential victims’ email accounts. In fact, most ransomware – and malware in […]
January 20, 2017
Via: Dark ReadingThough there were no mega breaches, 2016 had more breaches on record than any previous year, according to a new report. Last year witnessed few data breaches of the kind that rocked 2015 when organizations like Anthem, the Office of […]
January 13, 2017
Via: DataBreach TodayTwo researchers have confirmed that a December 2016 blackout in Ukraine was the result of a hacking campaign that began with spear-phishing attacks carrying malware (see Ukrainian Power Grid Blackout Alert: Potential Hack Attack). Their findings increase concerns that many […]
January 11, 2017
Via: Russel EdwardsSurveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy […]
Access control, Vulnerabilities
December 28, 2016
Via: Naked SecurityThe US House Judiciary Committee’s Encryption Working Group released its year-end report earlier this week, and it looks like a victory for many technology and privacy advocates. The report makes the following four points, which you can read in full […]
December 14, 2016
Via: InfoWorldAccording to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months. The big problem is that even when a […]
December 14, 2016
Via: SoftpediaRemote code execution flaws found in McAfee VirusScan Enterprise for Linux could allow an attacker to obtain root privileges, and a security researcher says that it’s all possible by simply tricking the app to use malicious update servers. Andrew Fasano […]
December 12, 2016
Via: Computer WeeklyThe 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging. An uncertain geopolitical environment, an ongoing outbreak of data breaches, high-profile distributed denial of service (DDoS) attacks […]
December 8, 2016
Via: Dark ReadingAntivirus provider Kaspersky Lab has revealed that around 323,000 new malware files are being identified each day by its product as opposed to 70,000 files per day in 2011. This, it claims, is an increase by 13,000 per day when […]
November 24, 2016
Via: Help Net SecuritySecurity remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, despite the changing attitudes towards security, some consumers are still making basic security faux […]
November 18, 2016
Via: Hot for SecuritySecurity researchers have regularly expressed concern across industries that manufacturers are particularly vulnerable to cyber threats, and now a study finally backs them up. After interviewing 35 manufacturing executives and analyzing 225 survey responses from industry executives, Deloitte discovered that […]
October 14, 2016
Via: CSO OnlineIf you want to have even a chance of defeating cyber attacks, you have to be quick. So, in hindsight, there is no mystery why the federal government’s Office of Personnel Management (OPM) was a loser to attackers who exfiltrated […]
October 10, 2016
Via: The HillSoftware that Yahoo installed at the behest of the National Security Agency or FBI may have been more malicious than originally reported, Motherboard reports. A New York Times story asserted that Yahoo developed software to search all emails for signatures […]
October 6, 2016
Via: InfoWorldYahoo has called a Reuters article about a secret email scanning program “misleading,” and said no such system exists. On Tuesday, the Reuters article claimed that Yahoo had created the custom software program after receiving a classified U.S. government order. […]
October 6, 2016
Via: Help Net SecurityDDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent use of DDoS attacks to distract as “smokescreens” in concert with other malicious activities that […]