Advertisement
Top

Tag: risks


Cloud security

Microsoft’s cloud dominance comes with a security risk

September 30, 2016

Via: InfoWorld

With each cloud vendor doing its utmost to shove more features into its offerings and tie them all together, are we looking at a new technology monoculture? That is, a community of computers that run identical software — sharing the […]


Access control

Privileged Credentials Remain Security Weak Point

September 23, 2016

Via: Security Week

A new survey suggests that while security awareness is improving, security preparedness is not keeping pace. The associated report, CyberArk’s Global Advanced Threat Landscape 2016, “juxtaposes rising confidence in cyber security strategies and leadership, with poor IT security habits that […]


Editorial, Malware, Vulnerabilities

How risky is macro malware, after all?

September 21, 2016

Via: Russel Edwards

Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]


Vulnerabilities

9 biases killing your security program

September 15, 2016

Via: CSO Online

Here’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware.We’re not always as rational in our decision-making as we’d like to think we are. This is often true in our daily […]


Malware

Surfacing HTA infections

September 14, 2016

Via: Malwarebytes

HTA is short for HTML Application, which are programs based on HTML and one or more scripting languages supported by Internet Explorer, usually VBScript or JScript. The default file-association for the .hta extension is the Microsoft HTML Application Host (mshta.exe). […]


Vulnerabilities

Emerging technologies are poking holes in security

September 13, 2016

Via: CSO Online

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed and regularity as well as the kinds of change challenge change management and ultimately security. […]


Cyber warfare, Editorial, Vulnerabilities

Humans for cyber-security: are they a catastrophe or an asset?

August 18, 2016

Via: Russel Edwards

Ignorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove […]


Access control

Cards with chips are still vulnerable

August 18, 2016

Via: Kaspersky Blog

The banking industry spends a lot of effort, time, and money to protect bank cards. For years, their protection consisted of embossed digits and a signature field, but now smart chips and one-time passwords stand guard between your money and […]


Application security, Privacy protection

IoT: A hacker’s dream come true?

August 1, 2016

Via: Help Net Security

There’s a lot more to the web than the cat-video-laden sites we normally see. In fact, according to most sources, the web that we can typically get to via our browser of choice represents only a small fraction of what’s […]


Vulnerabilities

Is it dumb to trust smart technology?

August 1, 2016

Via: CIO

Did we learn nothing from Arthur C. Clarke’s 1968 sci-fi epic, 2001: A Space Odyssey? In the film, astronauts on a mission to Jupiter discover that the HAL 9000 artificial intelligence computer that controls and automates all functions on the […]


Network security

Businesses Don’t Feel Protected by their IT Security Strategy

July 25, 2016

Via: Hot for Security

Some 600 IT professionals in the United States were interviewed to figure out best practices that could help businesses reduce infrastructure risks and raise awareness of the importance of insuring their most valuable information. In the past year, “the cost […]


Vulnerabilities

How Connected Cars are Driving Greater Security Concerns

July 22, 2016

Via: Security Week

62% of consumers are worried that cars will be easily hacked in the future, according to an RSA presentation from Kelly Blue Book. In their corresponding report “Braking the Connected Car: The Future of Vehicle Vulnerabilities,” one in three prospective […]


Application security, Editorial, Identity theft

Do you know who might steal your healthcare data?

July 20, 2016

Via: Russel Edwards

Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our […]


Malware

Are you prepared for a ransomware attack?

July 18, 2016

Via: TrendMicro Blog

Try as they might, companies are often unprepared when it comes to the security of their IT infrastructure. While organizations have to do everything in their power to plug up every single vulnerability in their systems, hackers only have to […]


Data loss, Hacker

What happens to consumer trust when a business is breached?

July 12, 2016

Via: Help Net Security

The Centrify study of 2,400 people across the UK, Germany and the US, looks at consumer attitudes towards hacking and how likely consumers are to continue transacting with businesses, including retailers, banks, government, travel, health and hospitality organizations, after a […]


Network security, Vulnerabilities

3-D Printing Vulnerabilities: Build Your Own Breach?

July 11, 2016

Via: Security Intelligence

Once reserved for large-scale manufacturing plants and educational institutions, 3-D printers are now going mainstream, with IDC predicting double-digit growth in shipments each year through 2020. But according to research from Carnegie Mellon University, increased availability may also prompt a […]


Access control, Vulnerabilities

Government IT pros overconfident in insider threat detection

July 8, 2016

Via: Help Net Security

An extensive study conducted by Dimensional Research evaluated the confidence of IT professionals regarding the efficacy of seven key security controls, which must be in place to quickly detect a cyber attack in progress. Study respondents included 763 IT professionals […]


Cyber warfare

Here Come the Olympics (and the Olympic-themed attacks)

July 7, 2016

Via: TrendMicro Blog

The Olympics are right around the corner, and the world will turn its attention to Rio de Janeiro for the Games of the XXXI Olympiad better known as the Summer Olympics in Rio. Unfortunately, the cyber-criminals know this and are […]


Application security, Vulnerabilities

Facebook Messenger flaw underscores risk of growing reliance on chat platforms

June 28, 2016

Via: TrendMicro Blog

Tom’s Hardware contributor Lucian Armasu reported in early June that security researchers had pinpointed a vulnerability in both the web browser and mobile app version of Messenger that would provide certain malicious capabilities to hackers. Further research uncovered that the processes […]


Application security, Vulnerabilities

As PCI 3.1 deadline is pushed back, online merchants face big risks

June 27, 2016

Via: TrendMicro Blog

Any merchant that accepts credit or debit card payments is likely familiar with the Payment Card Industry Data Security Standard. Managed by the PCI Security Standards Council (of which all the major U.S. card issuers are members), PCI DSS sets […]