Advertisement
Top

Tag: Report


Cloud security

Incident report on Cloudflare parser bug

February 28, 2017

Via: The Hacker News

Cloudflare reported last night a bug in their service which could have leaked information from the services using their edge cache servers. Feedly uses Cloudflare as a security shield which increases the reliability and performance of the Feedly web application. As […]


Virus & Malware

Survey Examines Cybersecurity Perception in U.S.

February 14, 2017

Via: Security Week

A new survey of American adults’ perceptions of cybersecurity and hackers shows both a generational and a gender divide in attitudes. Young adults often display a more pragmatic approach compared to a more hardline attitude from older Americans, while there […]


Threats & Malware, Vulnerabilities

Number of disclosed vulnerabilities reaches all time high in 2016

February 8, 2017

Via: Help Net Security

A new report shows 2016 broke the previous all-time record for the highest number of reported vulnerabilities. The 15,000 vulnerabilities cataloged during 2016 by Risk Based Security eclipsed the total covered by the CVE and National Vulnerability Database (NVD) by […]


Data loss

What’s the actual cost to a business of a data breach?

February 3, 2017

Via: Naked Security

Cisco has released the 10th of its annual cybersecurity reports, leading some publications to scream that security breaches can cost businesses 20% of their annual turnover. If you burrow into the headlines, however, it becomes apparent that only a third of […]


Email security

Spam Now Makes Up Nearly Two-Thirds Of All Email

February 2, 2017

Via: Dark Reading

Spam spikes, and nearly three-fourths of all organizations worldwide have suffered adware-borne infections, according to Cisco’s annual cybersecurity report. Spam now accounts for 65% of all email worldwide, and up to one-fifth of spam is malicious, according to new data […]


Malware

Spora ransomware could become the new Locky

January 20, 2017

Via: Help Net Security

A recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential victims’ email accounts. In fact, most ransomware – and malware in […]


Data loss

Number Of Data Breach Disclosures Jumped 40% in 2016

January 20, 2017

Via: Dark Reading

Though there were no mega breaches, 2016 had more breaches on record than any previous year, according to a new report. Last year witnessed few data breaches of the kind that rocked 2015 when organizations like Anthem, the Office of […]


Data loss

Ukraine Blackout Redux: Hacking Confirmed

January 13, 2017

Via: DataBreach Today

Two researchers have confirmed that a December 2016 blackout in Ukraine was the result of a hacking campaign that began with spear-phishing attacks carrying malware (see Ukrainian Power Grid Blackout Alert: Potential Hack Attack). Their findings increase concerns that many […]


Access control, Editorial

Mass surveillance, the invisible cyber enemy lurking in the future

January 11, 2017

Via: Russel Edwards

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy […]


Access control, Vulnerabilities

Encryption backdoors are ‘against the national interest’

December 28, 2016

Via: Naked Security

The US House Judiciary Committee’s Encryption Working Group released its year-end report earlier this week, and it looks like a victory for many technology and privacy advocates. The report makes the following four points, which you can read in full […]


Virus & Malware

Nearly half of all websites pose security risks

December 14, 2016

Via: InfoWorld

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months. The big problem is that even when a […]


Vulnerabilities

Vulnerabilities Found in Linux Security Software Can Give Hackers Root Access

December 14, 2016

Via: Softpedia

Remote code execution flaws found in McAfee VirusScan Enterprise for Linux could allow an attacker to obtain root privileges, and a security researcher says that it’s all possible by simply tricking the app to use malicious update servers. Andrew Fasano […]


Privacy protection

IT Priorities 2017: Buyers look for network privacy, visibility tools

December 12, 2016

Via: Computer Weekly

The 2017 Computer Weekly/TechTarget IT Priorities survey shows growing interest in network privacy, security and management, but SDN and NFV are still lagging. An uncertain geopolitical environment, an ongoing outbreak of data breaches, high-profile distributed denial of service (DDoS) attacks […]


Malware

Kaspersky Lab: 323,000 New Malware Samples Found Each Day

December 8, 2016

Via: Dark Reading

Antivirus provider Kaspersky Lab has revealed that around 323,000 new malware files are being identified each day by its product as opposed to 70,000 files per day in 2011. This, it claims, is an increase by 13,000 per day when […]


Network security

Consumers are still making basic security faux pas online

November 24, 2016

Via: Help Net Security

Security remains top of mind as over 70 per cent of consumers noted they always think about their security/privacy when shopping online, according to Centrify. Unfortunately, despite the changing attitudes towards security, some consumers are still making basic security faux […]


Vulnerabilities

Manufacturing industry most exposed to cyber threats, Deloitte says

November 18, 2016

Via: Hot for Security

Security researchers have regularly expressed concern across industries that manufacturers are particularly vulnerable to cyber threats, and now a study finally backs them up. After interviewing 35 manufacturing executives and analyzing 225 survey responses from industry executives, Deloitte discovered that […]


Data loss

The OPM breach report: A long time coming

October 14, 2016

Via: CSO Online

If you want to have even a chance of defeating cyber attacks, you have to be quick. So, in hindsight, there is no mystery why the federal government’s Office of Personnel Management (OPM) was a loser to attackers who exfiltrated […]


Data loss

Report: Secret software on Yahoo email gave government more control

October 10, 2016

Via: The Hill

Software that Yahoo installed at the behest of the National Security Agency or FBI may have been more malicious than originally reported, Motherboard reports. A New York Times story asserted that Yahoo developed software to search all emails for signatures […]


Data loss

Yahoo calls report of secret email scanning ‘misleading’

October 6, 2016

Via: InfoWorld

Yahoo has called a Reuters article about a secret email scanning program “misleading,” and said no such system exists. On Tuesday, the Reuters article claimed that Yahoo had created the custom software program after receiving a classified U.S. government order. […]


Network security

53% of DDoS attacks result in additional compromise

October 6, 2016

Via: Help Net Security

DDoS attack volume has remained consistently high and these attacks cause real damage to organizations, according to Neustar. The global response also affirms the prevalent use of DDoS attacks to distract as “smokescreens” in concert with other malicious activities that […]