View Full Version : Security News

  1. Siemens pushes out emergency SCADA updates
  2. How to evaluate national cyber security strategies
  3. How to detect fraudulent activity in a cloud without invading users' privacy
  4. Preparing for an information audit
  5. Leveraging network intelligence and deep packet inspection
  6. Adobe urges users to implement critical out-of-band Flash Player update
  7. Most people donít feel safe when shopping online
  8. The rise of account takeovers
  9. SaaS deployments are now mission critical
  10. Regin spy malware was used in Belgacom, EU government hacks
  11. New Docker version solves critical bugs, update immediately
  12. Sony Pictures hacked, blackmailed
  13. The context-aware security lifecycle and the cloud
  14. Why you should protect your wireless connection
  15. ISO 27001: An overview of ISMS implementation process
  16. Hacking RFID payment cards made possible with Android app
  17. Scammers used fake product listings to steal from Walmart
  18. Tips to avoid online scammers this holiday season
  19. Belgin backdoor: Sophisticated, stealthy, state-sponsored?
  20. Black Friday and Cyber Monday will put retailers under pressure
  21. Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption
  22. Fighting malware, emerging threats and AI
  23. ENISA guidelines on cryptographic solutions
  24. Millions of WordPress websites in danger due to easily exploitable bug
  25. Hikvision DVRs sporting bugs that allow device hijacking
  26. Users of Remote Access Trojans arrested in Europe
  27. ITIL and ISO 20000 problem management
  28. User behavior intelligence in the expanding supply chain
  29. IE "Unicorn" bug actively exploited in the wild
  30. Using company devices for personal activities leads to data loss
  31. 6 tips for protecting your Internet-connected devices
  32. Financial services cyber trends for 2015
  33. Detekt government surveillance spyware on your computer
  34. Windows Kerberos bug: How to detect signs of exploitation before the update?
  35. OpenDNS and IRISSCERT partner to fight security threats
  36. Thousands fall for Free Audi R8 Facebook scam
  37. New Citadel variant is after your master password
  38. Review: Secure file storage and sharing with nCrypted Cloud
  39. 8 cybercrime trends that will shape IT
  40. How the threat landscape is shaping the network security business
  41. New Synology NAS optimized for encryption and intensive tasks
  42. Whitepaper: Zero Trust approach to network security
  43. Most IT pros prefer open source to proprietary software
  44. Sophisticated Android-based botnet a danger to enterprise networks
  45. Google open sources Firing Range, a test tool for web app security scanners
  46. Whitepaper: CISOs secret weapon for reducing enterprise risk
  47. New non-profit CA aims to make HTTPS use universal
  48. Does cyber insurance help the CISO get a seat in the boardroom?
  49. 320 breaches reported between July and September
  50. Malware Domain Generating Algorithms are becoming more sophisticated
  51. Overwhelming optimism for information security in 2015
  52. DDoS attacks continue to fall in size and frequency
  53. One billion attacks were blocked during the third quarter
  54. Does cyber insurance help the CISO get a seat in the board room?
  55. Open Whisper Systems helps WhatsApp achieve end-to-end encryption
  56. Critical factors in preventing data breaches
  57. Michaels and Staples breaches carried out by same attackers?
  58. One-in-four have been victims of identity theft
  59. Trojanized Android firmware found on inexpensive handhelds
  60. Top 5 fraud risk areas in the workplace
  61. TRUSTe deceived consumers through its privacy seal program
  62. Risk assessment benefits, best practices and pitfalls
  63. ReadyNAS OS offers 5 levels of data protection
  64. Suspected WireLurker creators and distributors arrested in China
  65. Attackers shellshock, take over devices running on BusyBox
  66. US State Department targeted by hackers
  67. Most of the top 100 paid Android and iOS apps have been hacked
  68. The 2014 Firewall Buyers Guide
  69. Malicious Tor exit node is run by MiniDuke APT actors
  70. How to become an ISO 27001 / ISO 22301 consultant
  71. Week in review: Obama backs net neutrality, Darkhotel espionage, working at Pwnie Express
  72. The evolution of threat detection and Big Data
  73. Default ATM passcodes still exploited by crooks
  74. Mobile Pwn2Own 2014: Windows Phone's sandbox resists attack
  75. Facebook updates terms and policies, introduces interactive privacy guides
  76. Job description: Infosec Ranger at Pwnie Express
  77. Toshiba and Cisco to collaborate on new ways to utilize IoT
  78. Enabling secure file sharing in the enterprise
  79. OnionDuke: APT Attacks Via the Tor Network
  80. Secure remote file access challenges
  81. Best practices for government agencies to secure IT infrastructure
  82. Shaping mobile security
  83. Review: ESET Smart Security 8
  84. Americansí privacy behaviors and attitudes in the post-Snowden era
  85. ISPs are removing encryption from customers' emails
  86. Microsoft open sources .NET server stack
  87. The most unpopular person in the room
  88. The biggest challenges around connected devices
  89. Report: Targeted digital threats against civil society organizations
  90. Latest Microsoft patches crucial for all Windows users
  91. What grade does your favorite app get?
  92. SAP finally patches critical, remotely exploitable bugs in GRC solution
  93. Do senior executives value information security?
  94. Organized cyber crooks plunder SMBs with simple, cheap keyloggers
  95. Microsoft patches Windows, IE, Word, SharePoint and IIS
  96. Infosec industry: Time to put up or shut up
  97. Many IT pros store compromising material on their mobile phones
  98. Whitepaper: Still using proxies for URL filtering? Thereís a better way
  99. Tips for a safe holiday season
  100. 73% of organizations say BYOD increases security risks
  101. First victims of the Stuxnet worm revealed
  102. German spy agency wants to buy and use 0-day bugs
  103. Personal info of 800,000 USPS employees compromised in breach
  104. How cybercriminals scam consumers during the holiday season
  105. Only 47% of IT pros are confident in their hardware configurations
  106. 8 criteria to decide which ISO 27001 policies and procedures to write
  107. New SDK for Raspberry Pi protects embedded software
  108. Vigilance and the Enterprise of Things
  109. Obama backs net neutrality, asks FCC to reclassify broadband as a utility
  110. BrowserStack hacked, but it's not shutting down
  111. While rare, manual account hijacking is more damaging
  112. China is building a quantum encryption network between Beijing and Shanghai
  113. A holistic approach to protecting intellectual property
  114. After Silk Road 2, global law enforcement seizes other dark markets
  115. Darkhotel espionage campaign targets corporate executives traveling abroad
  116. Fake malware-laden Amazon emails target UK, US shoppers
  117. Aligning risk analysis and IT security spending
  118. Application Threat and Usage Report 2014
  119. Internet of Things to reach 30 billion devices in 2020
  120. Week in review: Unprecedented iOS, OS X malware, secure messaging tech, Silk Road 2 takedown
  121. 53M customer email addresses were also stolen in Home Depot breach
  122. Brazilian, Chinese govt sites host the most phishing pages
  123. After Silk Road 2, global law enforcement seizes other dark markets
  124. WireLurker: Apple blocks Trojanized apps, revokes certificate
  125. Overcoming Big Data security obstacles
  126. Silk Road 2.0 shut down, operator arrested, charged
  127. Enterprises must prepare for attacks on supply chain and POS in 2015
  128. One in three Americans donít use basic malware protection
  129. EFF: Use VPN to avoid Verizon's tracking header
  130. INTERPOL World 2015 expects high-level international participation
  131. Cisco projects data center traffic will nearly triple
  132. Dridex-laden spam emails targeting First World bank users
  133. WireLurker: Unprecedented iOS, OS X malware hits users
  134. Website fined for leaking encrypted card details and decryption key
  135. Accuvant and FishNet Security join to create new company
  136. Rovnix Trojan infection spree targets UK
  137. Inside corporate privacy programs at Fortune 1000 companies
  138. What attackers do after bypassing perimeter defenses
  139. Unsurprisingly, most believe their personal data is not secure
  140. eBook: Cybersecurity for Dummies
  141. New technique makes phishing sites easier to create, more difficult to spot
  142. Linksys SOHO router owners urged to patch multiple vulnerabilities
  143. Remember, Remember the Fifth of November
  144. Whitepaper: Automated Incident Response Management
  145. Using security, cloud and Big Data to drive success
  146. Which messaging technologies are actually secure?
  147. Free webinar: The basics of risk assessment and treatment according to ISO 27001
  148. Mobile security breaches impacted 68% of organizations
  149. Security issues in collaboration platforms
  150. Backoff PoS malware becomes stealthier, more difficult to analyze
  151. Google open sources nogotofail, a network traffic security testing tool
  152. Extracting data from air-gapped computers via mobile phones
  153. Nearly 50% have been a victim of a data breach
  154. 227,747 new malware samples are created daily
  155. OS X Yosemite sports serious privilege escalation bug
  156. Review: Hacking and Penetration Testing with Low Power Devices
  157. Targeted attacks around the globe will escalate
  158. Risky file sharing practices can cause data loss and compliance violations
  159. Whitepaper: 10 Things Your Next Firewall Must Do
  160. Flaw in Visa's contactless payment system could lead to fraud
  161. Researchers audit the TextSecure encrypted messaging app
  162. Facebook embraces Tor users, sets up onion address
  163. The psychology of Facebook scam victims
  164. Three branches of security: Strengthening your posture with checks and balances
  165. When to use tools for ISO 27001/ISO 22301 and when to avoid them
  166. Targeting security weaknesses in the phone channel
  167. Whitepaper: PKI infrastructure fundamentals
  168. Week in review: Critical Drupal 7 vulnerability, cloud myths, Ebola scams
  169. Pirate Bay co-founder sentenced for hacking CSC servers
  170. Open source Knock Knock tool reveals OS X malware
  171. Things that freak out IT security pros
  172. Android dialler hides, resists attempts to remove it
  173. SIEM doesn't reduce security incidents, say IT pros
  174. Dyre malware targeting Swiss bank customers
  175. The security threat of unsanctioned file sharing
  176. Most orgs unprepared to handle a cyber incident
  177. What's jeopardizing the safety of your datacenter?
  178. Cyber crime tool automates monetization of stolen payment cards
  179. CurrentC mobile payment system hacked, user info stolen
  180. Biggest ever cyber security exercise in Europe is underway
  181. Assume your Drupal 7 site has been compromised
  182. Photo gallery: McAfee FOCUS 14
  183. Post Snowden, most users have changed Internet habits
  184. NIST Guide to Cyber Threat Information Sharing open for comments
  185. Over a third of orgs have no real-time insight on cyber risks
  186. Dynamic endpoint protection by McAfee and ForeScout
  187. White House network breach was likely nation-sponsored
  188. Fake "Online Ebola Alert Tool" delivers Trojan, unwanted apps
  189. Orgs choose network performance over security
  190. It's Not a Game - It's a Violation of Human Dignity
  191. Over one-third of all enterprise data leakage policy violations occur on mobile devices
  192. Samsung users could be locked out of their devices by attackers
  193. US ICS operators under attack by crims wielding BlackEnergy malware
  194. 10% of employees unaware if they have an IT department or not
  195. IT is losing the battle on security in the cloud
  196. Fixing the broken windows of software security
  197. Russian-based cyber spies going after military, intelligence targets
  198. ScanBox keylogging framework lurking on disparate watering holes
  199. Belgacom shares more details about alleged GCHQ breach
  200. Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
  201. 246 percent spike in Apple-themed phishing scams
  202. Top 10 cloud myths
  203. Cyber security coalition reports on Chinese state-sponsored espionage
  204. Automation is the key to successful policy implementation
  205. Code Red: A global initiative for fighting government surveillance
  206. APWG launches global cybercrime reporting program
  207. Code Red: A global initiative for fighting government surveillance
  208. RBS WorldPay hack ringleader finally sentenced
  209. Tor exit node found patching downloaded binaries with malware
  210. Most IT sec pros still rely on perimeter security to stop APTs
  211. Mobile carriers fined $10M for making private user info accessible via Google search
  212. Week in review: Widespread malvertising, iCloud users under attack, and protecting yourself from electronic spying
  213. 57% increase in Backoff malware from August to September
  214. Explaining infosec magic to kids
  215. How Facebook prevents account hijacking when old email addresses are recycled
  216. How-to guide to protecting yourself from electronic spying
  217. Ebola-themed emails deliver malware, exploit Sandworm vulnerability
  218. Widespread malvertising campaign targets high-profile sites, delivers ransomware
  219. 100 million cloud file analysis reveals shadow data threat
  220. Open source NAC solution PacketFence 4.5.0 released
  221. 40% of enterprise employees use personal devices for work
  222. ISSA launches professional development framework
  223. INTERPOL World launches partners program
  224. Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
  225. Cyber skills shortage makes UK a soft target for hackers
  226. Attackers bypass Sandworm patch with new 0-day
  227. Event: DefCamp 2014
  228. Avast 2015 identifies vulnerable home routers
  229. Two exploit kits prey on Flash Player flaw patched only last week
  230. Apple warns about organized network attacks against iCloud users
  231. 10 tips for securing your future in the cloud
  232. Wanted: Testers For The Greatest Android App Ever
  233. Windows 0-day exploited in ongoing attacks, temporary workarounds offered
  234. Windows 0-day exploited in ongoing attacks, offers temporary workarounds
  235. Attackers change home routers' DNS settings via malicious code injected in ads
  236. Attackers change home routers' DNS setting via malicious code injected in ads
  237. Attackers change home routes' DNS setting via malicious code injected in ads
  238. Koler worm spreads via SMS, holds phones for ransom
  239. Think before you share that file
  240. 60% of Android attacks use financial malware
  241. Malware directs stolen documents to Google Drive
  242. 2FA: Google offers physical alternative to verification codes
  243. OS X Yosemite's Spotlight Suggestions: Privacy killer or not?
  244. Cloud adoption trends in European organizations
  245. Staples customers likely the latest victims of credit card breach
  246. What all major brands share in common with the Snappening
  247. Delivering malicious Android apps hidden in image files
  248. Small healthcare facilities unprepared for a data breach
  249. China executes MITM attack against iCloud and Microsoft account holders
  250. Hackers make companies' phones call premium-rate numbers, cost them billions