September 30, 2016
Via: InfoWorldWith each cloud vendor doing its utmost to shove more features into its offerings and tie them all together, are we looking at a new technology monoculture? That is, a community of computers that run identical software — sharing the […]
September 23, 2016
Via: Security WeekA new survey suggests that while security awareness is improving, security preparedness is not keeping pace. The associated report, CyberArk’s Global Advanced Threat Landscape 2016, “juxtaposes rising confidence in cyber security strategies and leadership, with poor IT security habits that […]
Editorial, Malware, Vulnerabilities
September 21, 2016
Via: Russel EdwardsMacro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]
September 15, 2016
Via: CSO OnlineHere’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware.We’re not always as rational in our decision-making as we’d like to think we are. This is often true in our daily […]
September 14, 2016
Via: MalwarebytesHTA is short for HTML Application, which are programs based on HTML and one or more scripting languages supported by Internet Explorer, usually VBScript or JScript. The default file-association for the .hta extension is the Microsoft HTML Application Host (mshta.exe). […]
September 13, 2016
Via: CSO OnlineAccelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security. […]
Cyber warfare, Editorial, Vulnerabilities
August 18, 2016
Via: Russel EdwardsIgnorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove […]
August 18, 2016
Via: Kaspersky BlogThe banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart chips and one-time passwords stand guard between your money and […]
Application security, Privacy protection
August 1, 2016
Via: Help Net SecurityThere’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of choice represents only a small fraction of what’s […]
August 1, 2016
Via: CIODid we learn nothing from Arthur C. Clarke’s 1968 sci-fi epic, 2001: A Space Odyssey? In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the […]
July 25, 2016
Via: Hot for SecuritySome 600 IT professionals in the United States were interviewed to figure out best practices that could help businesses reduce infrastructure risks and raise awareness of the importance of insuring their most valuable information. In the past year, “the cost […]
July 22, 2016
Via: Security Week62% of consumers are worried that cars will be easily hacked in the future, according to an RSA presentation from Kelly Blue Book. In their corresponding report “Braking the Connected Car: The Future of Vehicle Vulnerabilities,” one in three prospective […]
Application security, Editorial, Identity theft
July 20, 2016
Via: Russel EdwardsSmartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our […]
July 18, 2016
Via: TrendMicro BlogTry as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single vulnerability in their systems, hackers only have to […]
July 12, 2016
Via: Help Net SecurityThe Centrify study of 2,400 people across the UK, Germany and the US, looks at consumer attitudes towards hacking and how likely consumers are to continue transacting with businesses, including retailers, banks, government, travel, health and hospitality organizations, after a […]
Network security, Vulnerabilities
July 11, 2016
Via: Security IntelligenceOnce reserved for large-scale manufacturing plants and educational institutions, 3-D printers are now going mainstream, with IDC predicting double-digit growth in shipments each year through 2020. But according to research from Carnegie Mellon University, increased availability may also prompt a […]
Access control, Vulnerabilities
July 8, 2016
Via: Help Net SecurityAn extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber attack in progress. Study respondents included 763 IT professionals […]
July 7, 2016
Via: TrendMicro BlogThe Olympics are right around the corner, and the world will turn its attention to Rio de Janeiro for the Games of the XXXI Olympiad better known as the Summer Olympics in Rio. Unfortunately, the cyber-criminals know this and are […]
Application security, Vulnerabilities
June 28, 2016
Via: TrendMicro BlogTom’s Hardware contributor Lucian Armasu reported in early June that security researchers had pinpointed a vulnerability in both the web browser and mobile app version of Messenger that would provide certain malicious capabilities to hackers. Further research uncovered that the processes […]
Application security, Vulnerabilities
June 27, 2016
Via: TrendMicro BlogAny merchant that accepts credit or debit card payments is likely familiar with the Payment Card Industry Data Security Standard. Managed by the PCI Security Standards Council (of which all the major U.S. card issuers are members), PCI DSS sets […]