January 23, 2018
Via: CSO OnlineI’ve been surprised by the lack of interest, by both the general public and some IT admins, in the Meltdown and Spectre vulnerabilities, which are arguably the most significant computer vulnerabilities we have ever dealt with. To be fair, this […]
January 23, 2018
Via: DataBreach TodayA ransomware attack on electronic health records vendor Allscripts late last week is a reminder of the potential disruption to patient care delivery healthcare entities can face if a cloud-services provider suffers a cyberattack. It also points to the need […]
December 5, 2017
Via: Dark ReadingAs government regulation looms, the security industry must take a leading role in determining whether the convenience of the Internet of Things is worth the risk and compromise of unsecured devices. Earlier this year, the Food and Drug Administration (FDA) […]
October 10, 2017
Via: CSO OnlineIt happens in every company. Employees find a cool new online service that makes them more productive. They create free or low-cost accounts on devices they use for work, and get all their friends and colleagues to join up. The […]
October 6, 2017
Via: Security IntelligenceIn an ever-changing, dynamic threat landscape, a chief information security officer (CISO) in the health care sector must have knowledge in multiple areas and understand that data breaches have severe repercussions that affect employees, patients and the organization at large. […]
September 22, 2017
Via: Security IntelligenceThere are two popular attitudes about cloud security, and both of them are wrong. One belief is that putting data in the cloud amounts to putting it on the public internet for anyone to access. Therefore, the only way to […]
Application security, Vulnerabilities
August 23, 2017
Via: Security IntelligenceEmployees use open source applications in organizations of all sizes and across all industries, and this trend shows no signs of slowing down. It is both cost effective and efficient to incorporate source code into software during the development stage. […]
August 22, 2017
Via: Security WeekIt should come as no surprise that the upward trend of larger-scale attacks against critical infrastructure poses substantial cyber and physical risks across the enterprise. After all, critical infrastructure sectors are categorized as such because, according to the Department of […]
March 10, 2017
Via: MalwarebytesVirtual machines are a great tool to run untrusted piece of software and analyzing the network activity. Most of the time, the default networking configuration uses a bridge to allow VMs to communicate. One caveat about this approach is that […]
May 9, 2016
Via: Security WeekOn the heels of the Superfish embarrassment earlier this year, the Chinese computer manufacturer is warning that multiple vulnerabilities in the “Lenovo Solution Center” could expose millions of users to malicious hacker attacks. The most serious of the four vulnerabilities, […]
November 23, 2015
Via: Security IntelligenceIncreasing your employees’ security IQ is a critical step toward securing your key corporate assets. While this step is important, it is essential that other initiatives be implemented simultaneously. In order to create a fully integrated security approach, executives must […]
November 23, 2015
Via: Dark MattersA backdoor inside a backdoor. Sounds ominous doesn’t it? The bad guys simply love it. Your Internet Service Provider (ISP) can be your weakest link, in the realm of cable modem security. Some ISP’s rank worse than others, when it […]
September 21, 2015
Via: data-lossAlthough a majority of data compromises come from external actors, including nation-state groups and cyber-crime gangs, #internal #employees account for 43 percent of #data loss, half of the time these leaks are accidental, a new #study from #intel security indicates. […]
September 6, 2015
Via: hackerContent Management systems (CMS) have become an attractive target for #hackers who aim to #exploit #vulnerabilities in the popular blogging platform #wordpress. Globally, more than 20 percent of WordPress based-websites are running older core versions. #outdated WordPress plugins are also […]
July 29, 2015
Via: network-securityA portion of the Department of Defence’s nonclassified email network used by Army General Martin Dempsey and other members of the U.S. military’s Joint Staff has been shuttered after “suspicious activity” was detected on the systems over the weekend. “We […]
July 16, 2015
Via: threats-and-malwareMicrosoft has announced that, as of July 15, all security solutions for XP users will stop receiving updates, leaving users exposed to threats. Windows XP will no longer provide the Malicious Software Removal Tool or updates to Microsoft Security Essentials. […]
June 9, 2015
Via: cloud-securityBitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and #mobile devices, the inability to protect […]
June 4, 2015
Via: data-loss46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the survey of 1,000 IT professionals, conducted by OnePoll on behalf […]
June 3, 2015
Via: hackerOpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses. Using anonymized data from the billions of Internet requests routed through OpenDNS’s global […]
May 28, 2015
Via: Cyber WarfareCompanies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software revealed. The survey, which was carried out at RSA […]