View Full Version : Security News

  1. Application manager that pleases both IT and the user
  2. SecureDoc Cloud removes security concerns related to cloud file sharing
  3. Photos: RSA Conference 2015, part 6
  4. German intelligence agency helped NSA spy on EU companies
  5. Centrify launches cloud-based privileged identity service
  6. 70 bad exit nodes used in attack against Tor-based SIGAINT
  7. High-profile data breaches made most CEOs re-examine security programs
  8. Latest trends in the ransomware business
  9. Barracuda makes its NG Firewall manageable via iOS app
  10. 100,000 web shops open to compromise as attackers exploit Magento bug
  11. DDoS threat recognized by all members of the C-suite
  12. High-profile data breaches made most CEOs re-exam security programs
  13. Cyphort combines APT detection with lateral movement
  14. IBM brings cyber threat analytics to the cloud
  15. WordPress issues critical security release
  16. Network discovery and visibility for massive enterprise networks
  17. Card skimming gang stole 3M euros using ghost PoS terminals
  18. The ticking cybersecurity risk: Managing wearable tech in the workplace
  19. Banking botnets persist despite takedowns
  20. Vulnerability management for over 15,000 unique apps
  21. Smarter threats and the rising complexity of cybercrime
  22. Gemaltoís solutions challenge todayís security thinking
  23. BalaBit releases syslog-ng Premium Edition with Big Data support
  24. Mobile malware is like Ebola - an overhyped threat
  25. Waratek named Most Innovative Company
  26. Hacktivists are targeting law enforcement personnel, warns FBI
  27. Monitoring user activity in proprietary business-critical apps
  28. Protecting identities from the endpoint to the cloud
  29. White House cyber attackers linked to OnionDuke APT actor
  30. Popular WordPress plugins vulnerable to XSS
  31. Security industry has failed, its time to chart new course
  32. Knowledge base of malware intelligence enables rapid containment
  33. How attackers exploit end-users psychology
  34. Continuous monitoring of perimeter and internal IT assets
  35. Evasive malware goes mainstream
  36. Simplified VPN, web access for authorized users via push notification
  37. Qualys takes step towards complete automation of web app security
  38. Cloud agent platform for continuous IT asset inventory, security and compliance
  39. Apple Watch app for managing threat intelligence on-the-go
  40. Automated protection of enterprise email, docs and data
  41. Raytheon delivers end-to-end visibility to address cyber threats
  42. 1,500 iOS apps sport flaw that allows interception of sensitive user data
  43. Identity, data governance across all apps, systems, and devices
  44. One-in-four Americans victimized by information security breaches
  45. Making password databases impossible to steal
  46. Apples fix didnt close Rootpipe backdoor
  47. New fileless malware found in the wild
  48. IoT creates new set of risks, orgs embrace active defense
  49. Secure dynamic perimeters in cloud and hybrid environments
  50. How can organizations adapt to the rise in data breaches?
  51. New cloud security certification from (ISC)2 and CSA
  52. Ethical connected car hacking service launched
  53. Secure dynamic perimeters in cloud and hybrid environments
  54. How can organizations adapt to the rise in data breaches?
  55. New cloud security certification from (ISC)2 and CSA
  56. Ethical connected car hacking service launched
  57. Use of encryption continues to rise
  58. Fox-IT launches cyberthreat management platform
  59. Upatre malware gets full SSL comms encryption
  60. Valve tries to curb Steam scam accounts with new rule
  61. Security guidance for early IoT adopters
  62. Russian APT group actively exploiting Flash, Windows 0-day flaws
  63. Advanced threat detection platform leveraging distributed computing
  64. Organizations continue to rely on outdated technologies
  65. Radware launches hybrid cloud based WAF service
  66. The portable secure desktop: tVolution Mini
  67. Consumers think passwords are of no value to criminals
  68. Key trends and opportunities in the information security profession
  69. Five misunderstandings about cloud storage
  70. BlackVault CYNR: Code and document signing appliance
  71. Attackers actively downing Microsofts IIS web servers
  72. GitHub issues transparency report
  73. Exploit for crashing Minecraft servers made public
  74. How IT pros protect and investigate their endpoints
  75. Pawn Storm cyberspies still at work, target NATO and the White House
  76. 1 in 4 employees enable cloud attacks
  77. D-Links failed patch for DIR-890L router adds a new hole
  78. IBM unveils cyber threat intelligence sharing platform
  79. HSBC Finance Corporation confirms data breach
  80. Perception and reality of perimeter security effectiveness
  81. Cisco splats router bug that can lead to persistent DoS
  82. Dropbox launches bug bounty, will also pay for previously reported bugs
  83. TeslaCrypt ransomware pushed by several exploit kits
  84. Internet of Everything attack surface grows
  85. What IT skills are in demand?
  86. Perception and reality of perimeter security effectiveness
  87. New Java vulnerabilities remotely executable without login
  88. PCI DSS 3.1 released
  89. Attorney claims cops planted spying malware on drive containing evidence
  90. How can defenders gain advantage in the 0day market?
  91. Google blocks Java plugin in new Chrome by default
  92. Adobe fixes Flash Player zero-day exploited in the wild
  93. Microsoft releases 11 security bulletins
  94. New trend in cybercriminal activity: APT wars
  95. Lack of skilled infosec pros creates high-risk environments
  96. Key trends for risk-prone behavior in the workforce
  97. Compromised credentials haunt cloud app usage
  98. Misconfigured DNS servers may leak domain info, warns US-CERT
  99. Former lottery infosec head accused of hacking computers to buy winning ticket
  100. Main sources of data breaches: Phishing, RAM scrapers, web app insecurity
  101. 18-year-old bug can be exploited to steal credentials of Windows users
  102. Attackers use deceptive tactics to dominate corporate networks
  103. Attackers use deceptive tactics to dominate corporate networks
  104. The key challenges to timely incident response
  105. A look at emergent threats and their influence
  106. Cloud security: CA conducts advanced research
  107. CoinVault ransomware: Retrieve data without paying the criminals
  108. Attackers can easily crack Belkin routers WPS PINs
  109. New security requirements for payment card vendors
  110. US prohibits Intel to export chips for Chinese supercomputers
  111. TV5Monde makes new security blunders in wake of hack
  112. Are privileged users the most dangerous insider?
  113. Phishers increasingly target banks and ISP accounts
  114. Simda botnet taken down in global operation
  115. Man gets 150 months in prison for selling stolen and counterfeit credit cards
  116. Guide: Combating identity fraud in a virtual world
  117. Week in review: Apple closes OS X backdoor, cyber crooks go after enterprise millions, and what happens to data after a breach
  118. TorLocker victims can decrypt most files without paying ransom
  119. Beware of malicious "Internal ONLY" emails
  120. Latest OS X update closes backdoor that allows root access
  121. Test your cybersecurity knowledge and decision-making skills
  122. DARPA to create software systems that last 100 years
  123. Preventing and detecting insider threats
  124. Worldwide IT spending to decline in 2015
  125. Multi-platform AlienSpy RAT targeting consumers, enterprises
  126. 122 online forums compromised to redirect visitors to Fiesta exploit kit
  127. Scammers deliver malware via fake Steam game pages
  128. Event: Black Hat USA 2015
  129. Event: TRUSTe Internet of Things Privacy Summit 2015
  130. Deadly combination of Upatre and Dyre Trojans still actively targeting users
  131. Polymorphic Beebone botnet sinkholed in international police operation
  132. MitM, DoS bugs in Network Time Protocol squashed
  133. Report: Security in the age of enterprise technology
  134. The need for end-user visibility in a Bring Your Own Anything environment
  135. Cybercrime gets easier, attribution gets harder
  136. Securing high-risk, third-party relationships
  137. HardSploit: Dedicated hardware pentesting tool
  138. Russian hackers executed the US State Department, White House network breaches
  139. Large malvertising campaign linked to potentially compromised Google ad reseller
  140. New Tor version fixes issues that can crash hidden services and clients
  141. Malware peddlers exploit fear of Android Installer Hijacking bug
  142. Guide outlines specifications of smart card-based PACS
  143. IoT devices facilitate robbery, stalking and cybercrime
  144. Are you prepared for dealing with a breach?
  145. CSA to hold hackathon featuring $10,000 prize
  146. Firefox loses opportunistic encryption feature due to critical flaw
  147. New crypto-ransomware "quarantines" files, downloads info-stealer
  148. How to keep your Facebook account secure
  149. Snapchat blocks third-party apps from accessing its APIs
  150. Qualys experts and customers to present security best practices at RSA Conference 2015
  151. Cyber crooks go after enterprise millions with Dyre malware, social engineering
  152. What happens to data after a breach?
  153. How to protect from threats against USB enabled devices
  154. eBook: The shortcut guide to network management
  155. Mozilla revokes trust for CNNIC certificates
  156. Boards must up their game before the hackers claim checkmate
  157. Digital privacy and Internet security to intersect at Digital Rights Europe
  158. Guidelines on the auditing framework for Trust Service Providers
  159. Google boots unwanted ad injector extensions from Chrome Web Store
  160. Google decides to stop trusting CNNIC certificates
  161. US to enact sanctions against foreign cyber attackers
  162. Review: Tresorit for Business
  163. Crypto ransomware sightings and trends for Q1 2015
  164. How vulnerable is our critical national infrastructure?
  165. Whats complicating your security readiness?
  166. Dont just deploy a backup solution and hope for the best
  167. Feds subpoena Reddit for info on DarknetMarkets subreddit users
  168. WordPress sites compromised to redirect to Pirate Bay clone, exploit kit
  169. Firefox 37 enhances security
  170. Malware posing as MyTeamVoice app spread via Steam chat
  171. Cyber threat intelligence: Perception and use
  172. I donít need friends, I have followers
  173. Companies now have 1,555 partners in the cloud
  174. Cyber threat intelligence: Perception and use
  175. Consumers would sell personal information for a price
  176. French, Italian users targeted with judicial-themed spam leading to malware
  177. How security pros deal with cybercrime extortion
  178. Users care about privacy when they know what info is collected about them
  179. Middle-Eastern energy firms targeted with reconnaissance Trojan
  180. Fake "Urgent billing update" email leads to Virgin Media, Paypal phishing page
  181. Puush servers compromised to deliver malware disguised as app update
  182. Two feds charged for stealing Bitcoin during Silk Road investigation
  183. Half of companies under DDoS attack have critical data stolen
  184. Look where you're going before backing up
  185. Puush servers compromised to deliver malware disguised of as app update
  186. The importance of backup
  187. Human error lead to leak of world leaders' personal information
  188. Massive DDoS against GitHub continues
  189. Botnets inflating Twitch audiences help broadcasters earn money
  190. Most enterprise network teams now deal with security investigations
  191. Data breaches drive identity theft and fraud
  192. Slack hacked, user database compromised
  193. British Airways freezes some frequent-flyer accounts in wake of hack
  194. Week in review: Hacking air-gapped computers using heat, car hacking, malware threat to virtual currencies
  195. 10 practical security tips for DevOps
  196. Critical flaw in WiFi routers puts hotels and millions of guests at risk
  197. Car hacking made cheaper and easier
  198. US tech giants urge Congress to curb mass digital surveillance
  199. "Free $20 Steam codes" offer leads to online surveys
  200. Researchers identify malware threat to virtual currencies
  201. Crowdsourcing your bug bounty program
  202. The multiple benefits of IT auditing
  203. Amazon Cloud Drive now with unlimited cloud storage
  204. Apple-themed "Your account has been limited" phishing emails doing rounds
  205. Xtube visitors redirected to exploit kit landing page
  206. How companies secure their cloud data
  207. Behavioral biometrics: The password you canít forget
  208. Huge spam operation on Twitter uncovered
  209. Data lurking: How to protect your company against overlooked insider threats
  210. Researcher finds backdoor opened by Dells helper app
  211. Multifunctional Vawtrak malware now updated via favicons
  212. Macro-based malware continues to gain traction
  213. 15,435 vulnerabilities across 3,870 applications were recorded in 2014
  214. Half of all Android devices vulnerable to installer hijacking attacks
  215. Implementing an effective risk management framework
  216. Mobile apps are not being tested for insecure behavior
  217. One in three top Alexa websites is risky
  218. Organizations have little control over privileged access
  219. Premera breach: Are HIPAA standards too low?
  220. Finalists announced for Innovation Sandbox at RSA Conference 2015
  221. Old Adobe Flex SDK bug still threatens users of many high-profile sites
  222. Full, cracked version of NanoCore RAT leaked, onslaught of infection attempts expected
  223. The average DDoS attack tripled in volume
  224. Twitch forces users to reset password in wake of breach
  225. UK consumers committed to mobile privacy
  226. Hack air-gapped computers using heat
  227. Sensitive data resides in the cloud
  228. Four advantages of an identity behavior-based approach to cybersecurity
  229. Fake "Incoming Fax Report" emails lead to crypto-ransomware
  230. Flaw in Hilton Honors website left all customer accounts wide open
  231. New PoS malware family comes with keylogger component
  232. Most parents donít know how to tackle cyber bullying
  233. Cisco Small Business IP phones vulnerable to eavesdropping
  234. Scammers use Whatsapp calling feature as a lure
  235. Tails 1.3.1 emergecy release fixes security issues
  236. Trumping cybercriminals during tax season: Tips on how to stay safe
  237. WordPress plugin used by millions sports critical site-hijacking flaw
  238. Fake job seekers emails deliver ransomware and info-stealer
  239. Bank of America phishing attack hits customers
  240. State-sponsored hackers target European, Israeli organizations
  241. Mobile app developers are not investing in security
  242. IT pros are taking action against the insider threat
  243. Why you shouldnt ignore change auditing
  244. OpenSSL security update less critical than expected, still recommended
  245. Polymorphic security warnings more effective than same, static ones
  246. Pinterest swaps T-shirts for money rewards in bug bounty program
  247. Windows 10 will let you log in with your face and fingerprint
  248. Smart cities to use 1.1 billion connected things
  249. Many admit that passwords are their only IT security measure
  250. Security risks of networked medical devices