January 11, 2017
Via: Russel EdwardsSurveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy […]
January 10, 2017
Via: Computer WeeklyIf we are talking DNS (domain name system), then we are talking risk. Using the internet to do business is a risk, an acceptable one for most, but still a risk. And the assumptions we make about business resilience when […]
January 6, 2017
Via: Naked SecurityDepending on your outlook, the Internet of Things (IoT) is either an exciting frontier that promises to embed smartness into a world of unforgivably dumb objects or a gilded cage of expensive proprietary technology whose security standards we must take […]
January 4, 2017
Via: Russel EdwardsDuring a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy […]
December 21, 2016
Via: Security WeekDaily, businesses are bombarded with risks from physical and financial to strategic and operational. Communicating these risks to employees is critical because it helps the organization sense and respond to threats as a cohesive unit. This communication also needs to […]
December 14, 2016
Via: MawarebytesMemes are weird things and weren’t always about lolcats or frogs or whatever the latest terrible image macro doing the rounds happens to be. I quite like this line from Wikipedia on said subject: Proponents theorise that memes are a viral […]
December 14, 2016
Via: InfoWorldAccording to a new study of the top one million domains, 46 percent are running vulnerable software, are known phishing sites, or have had a security breach in the past twelve months. The big problem is that even when a […]
November 29, 2016
Via: TrendMicro BlogWhile most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]
Mobile security, Network security
November 29, 2016
Via: Panda SecurityAs we enter the Christmas period, many of your company’s employees will be deciding to change their phones in the coming months. Something as simple and seemingly harmless as a gift (or a purchase from the Black Friday sales) could […]
November 17, 2016
Via: Threat PostOne thing technologists overtly shun is the prospect of government regulation. But recent DDoS attacks carried out by botnets of connected things have spooked some people of influence in security to the point where intervention by lawmakers may be inevitable. […]
November 16, 2016
Via: Security WeekThe Mac version of the Shazam music discovery application keeps the device’s microphone active even after the user has switched off the app. While it doesn’t appear that Shazam is trying to spy on users, this behavior does have some […]
November 11, 2016
Via: Dark ReadingSMBs are putting sensitive information at risk by using free cloud storage services that lack strong security measures, new research shows. Nearly 25% of small- to midsized-sized businesses (SMBs) continue to use free cloud storage services despite warnings from security […]
November 11, 2016
Via: Dark ReadingDespite geopolitical uncertainties, cyber threats are the financial industry’s biggest worry, new data shows. Cyber risk is the top-ranked overall risk to the global financial system, a new study released earlier this week found. The Q3 study conducted by The Depository Trust & […]
November 11, 2016
Via: Computer WeeklyUsing insurance to transfer the risk associated with cyber breaches is on the increase as the costs of responding continue to rise. High-profile attacks at Sony, Target and Home Depot were notable both in terms of the scale of the […]
October 28, 2016
Via: The HillNuclear power plants, chemical plants, defense contractors and other highly sensitive industries and workers are leaking information through their pagers, a new report shows. Pagers have been out of vogue with the public since the rise of the cellphone but are […]
October 25, 2016
Via: Rsam blogMost large organizations have a security incident response (IR) program in place – even if it only exists in a three-ring binder. The challenge for most is to get from its current form into an automated platform that will empower […]
Cloud security, Wireless security
October 20, 2016
Via: Help Net SecurityA new Xirrus survey highlights users’ habits and perceptions of risk when connecting to public Wi-Fi. The survey polled more than 2,000 business users, including executives and IT professionals, and found that while 91 percent of respondents do not believe […]
October 13, 2016
Via: InfoWorldMillions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says. The problem is well known and […]
October 10, 2016
Via: Security AffairsSpotify users have been targeted by a malvertising campaign, the malicious advertising served to the victims could automatically open a web browser and redirect victims websites hosting malware. Spotify is a popular online music service that allows its users to listen […]
October 7, 2016
Via: Computer WeeklyTerror groups, not nation states, are the most likely to unleash devastating cyber weapons, according to Eugene Kaspersky, chief executive and co-founder of security firm Kaspersky Lab. “I am 99.99% sure some nation states have developed top secret cyber weapons,” […]