Research: 41 percent increasing IT security budget in 2014
Security concerns, budgets, trends and future plans were the focus of a recent Tech Pro Research survey, in which 41 percent of respondents said they will spend more on IT security in 2014 compared to...
View ArticleMicrosoft patches Windows, IE, Office and servers
Updates released today address a total of 37 vulnerabilities in Windows, Internet Explorer, Office, SharePoint Server 2013, the .NET Framework and SQL Server.
View ArticleMicrosoft Fixes Critical Vulnerabilities in Internet Explorer, Windows
Microsoft and Adobe released a set of patches today to fix critical vulnerabilities in their products.
View ArticleAna Veciana-Suarez: Hackers make life a pain in the password
About three months ago, when the Heartbleed encryption bug was discovered, I painstakingly sifted through all my online accounts – banking, social media, investments and emails – to change every single...
View ArticleChicago Yacht Club Point-of-Sale System Compromised
Following an investigation into a point-of-sale (PoS) system crash, Chicago Yacht Club found evidence consistent with malware installation on one of their servers. Further examination determined that...
View ArticleAdobe Reader and Acrobat Zero-Day Vulnerability Patched in 11.0.08
A new, out-of-band update has been released for Adobe Reader and Acrobat, fixing a security flaw that offers an attacker the possibility to bypass sandbox protection.In a security bulletin issued on...
View ArticleSeven Critical Flash Player Vulnerabilities Fixed in New Version
The latest revision of Adobe Flash Player adds no less than seven security patches to the software, all marked critical.Four of the glitches were reported by Chris Evans, from Googles Project Zero and...
View ArticleResearcher Finds Potholes In Vehicle Traffic Control Systems
DEF CON 22 – Smart traffic sensor systems that help regulate and automate the flow of traffic and lights contain security weaknesses that could be manipulated by hackers and result in traffic jams or...
View ArticleNew Android Malware Krysanec Infects Legitimate Apps
A new remote access Trojan (RAT) for Android has been found to integrate malicious functionality in legitimate apps, allowing the attacker control over various functions of the device, such as camera,...
View ArticleBank Faces Lawsuit Over $327,000 in Losses from Cyber Attack
Hackers stole the funds from TEC Industrial in 55 separate ACH drafts on May 10, 2012.
View ArticlePartnerships, Innovation Drive CyberPatriot Success
The report of the largest known harvest of Internet credentials, an estimated 1.2 billion passwords, names and personal information from 420,000 web sites by a group of Russian hackers, is but the...
View ArticleApple to store some user data in China: Weighing the pros and cons
Apple’s move to store some of its Chinese user’s data in the country has benefits — and drawbacks — for its customers.
View Article2014 ICS Cyber Security Conference Agenda Update
Our team is busy putting together the bestICS Cyber Security Conferenceto date.
View ArticleLocal farmers market website hijacked by Russians
The East Nashville Farmers Market is an unlikely victim of Russian hackers that have hijacked its website.
View ArticleBypassing Security Defenses: DEF CON
In an attacker’s ideal world, he or she would infect a desktop, steal the user’s RDP password and move smoothly across the network to the RDP server and immediately gain access. In real life however,...
View ArticleAlbertson’s stores hacked for credit card data
Hackers have broken into the credit and debit card payment networks at two of the nation’s most popular supermarket store chains: Albertson’s and SuperValu. Incoming search terms for the article:...
View ArticleSecurity Research and the Law: What You Need to Know
Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.
View ArticleRobin Williams’ ‘Goodbye’ Video – Facebook Scam
A message circulating on Facebook claims to take users to a video recorded by Robin Williams to say goodbye before his untimely death; this is another cybercriminal attempt to exploit user curiosity to...
View ArticleHeartbleed exposes weaknesses in hardware design
Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.
View ArticleRussian hacking suspect ordered held until trial
Robert W. Ray, left, and Ely Goldin, right, attorneys for Roman Seleznev, speak with reporters outside the U.S. District Courthouse in Seattle on Friday, Aug. 15, 2014.
View Article