Advertisement
Top

Tag: risks


Access control, Editorial

Mass surveillance, the invisible cyber enemy lurking in the future

January 11, 2017

Via: Russel Edwards

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy […]


Vulnerabilities

Security Think Tank: Know the business risks of using the internet

January 10, 2017

Via: Computer Weekly

If we are talking DNS (domain name system), then we are talking risk. Using the internet to do business is a risk, an acceptable one for most, but still a risk. And the assumptions we make about business resilience when […]


Application security

All that glisters is not security gold at CES in Las Vegas

January 6, 2017

Via: Naked Security

Depending on your outlook, the Internet of Things (IoT) is either an exciting frontier that promises to embed smartness into a world of unforgivably dumb objects or a gilded cage of expensive proprietary technology whose security standards we must take […]


Editorial, Privacy protection

Data Brokers and why is privacy protection valuable

January 4, 2017

Via: Russel Edwards

During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy […]


Application security

The Danger of Miscommunication Between Security and DevOps

December 21, 2016

Via: Security Week

Daily, businesses are bombarded with risks from physical and financial to strategic and operational. Communicating these risks to employees is critical because it helps the organization sense and respond to threats as a cohesive unit. This communication also needs to […]


Malware

Ransomware tries its hand at being a deadly viral meme

December 14, 2016

Via: Mawarebytes

Memes are weird things and weren’t always about lolcats or frogs or whatever the latest terrible image macro doing the rounds happens to be. I quite like this line from Wikipedia on said subject: Proponents theorise that memes are a viral […]


Virus & Malware

Nearly half of all websites pose security risks

December 14, 2016

Via: InfoWorld

According to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months. The big problem is that even when a […]


Vulnerabilities

Company Crown Jewels for Sale: How Espionage as a Service Affects Enterprises

November 29, 2016

Via: TrendMicro Blog

While most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]


Mobile security, Network security

Anticipate the risk of your employees getting a new phone for Christmas

November 29, 2016

Via: Panda Security

As we enter the Christmas period, many of your company’s employees will be deciding to change their phones in the coming months. Something as simple and seemingly harmless as a gift (or a purchase from the Black Friday sales) could […]


Network security

Regulation May Be Best Answer to IoT Insecurity

November 17, 2016

Via: Threat Post

One thing technologists overtly shun is the prospect of government regulation. But recent DDoS attacks carried out by botnets of connected things have spooked some people of influence in security to the point where intervention by lawmakers may be inevitable. […]


Application security, Malware

Shazam for Mac Keeps Listening Even When Disabled

November 16, 2016

Via: Security Week

The Mac version of the Shazam music discovery application keeps the device’s microphone active even after the user has switched off the app. While it doesn’t appear that Shazam is trying to spy on users, this behavior does have some […]


Cloud security

Free Cloud Storage Putting Small Business Data At Risk

November 11, 2016

Via: Dark Reading

SMBs are putting sensitive information at risk by using free cloud storage services that lack strong security measures, new research shows. Nearly 25% of small- to midsized-sized businesses (SMBs) continue to use free cloud storage services despite warnings from security […]


Virus & Malware

DTCC Survey: Cyber Threat Ranked #1 Risk To Global Financial System

November 11, 2016

Via: Dark Reading

Despite geopolitical uncertainties, cyber threats are the financial industry’s biggest worry, new data shows.  Cyber risk is the top-ranked overall risk to the global financial system, a new study released earlier this week found. The Q3 study conducted by The Depository Trust & […]


Vulnerabilities

Security Think Tank: Cyber insurance – factor in all costs and obligations

November 11, 2016

Via: Computer Weekly

Using insurance to transfer the risk associated with cyber breaches is on the increase as the costs of responding continue to rise. High-profile attacks at Sony, Target and Home Depot were notable both in terms of the scale of the […]


Data loss

Nuclear power, defense workers leaking data through unsecure pagers

October 28, 2016

Via: The Hill

Nuclear power plants, chemical plants, defense contractors and other highly sensitive industries and workers are leaking information through their pagers, a new report shows. Pagers have been out of vogue with the public since the rise of the cellphone but are […]


Vulnerabilities

A CISO’s 8 Recommendations for a Security Incident Response Program

October 25, 2016

Via: Rsam blog

Most large organizations have a security incident response (IR) program in place – even if it only exists in a three-ring binder. The challenge for most is to get from its current form into an automated platform that will empower […]


Cloud security, Wireless security

Public Wi-Fi: Users’ habits and perceptions of risk

October 20, 2016

Via: Help Net Security

A new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives and IT professionals, and found that while 91 percent of respondents do not believe […]


Vulnerabilities

Leaky IoT devices help hackers attack e-commerce sites

October 13, 2016

Via: InfoWorld

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says. The problem is well known and […]


Application security, Malware

Also Spotify in the list of services victim of a malvertising campaign

October 10, 2016

Via: Security Affairs

Spotify users have been targeted by a malvertising campaign, the malicious advertising served to the victims could automatically open a web browser and redirect victims websites hosting malware. Spotify is a popular online music service that allows its users to listen […]


Cyber warfare

Terror groups likely to be first to unleash cyber weapons, says Eugene Kaspersky

October 7, 2016

Via: Computer Weekly

Terror groups, not nation states, are the most likely to unleash devastating cyber weapons, according to Eugene Kaspersky, chief executive and co-founder of security firm Kaspersky Lab. “I am 99.99% sure some nation states have developed top secret cyber weapons,” […]