The need for information security innovation
The increasing number of connected devices is multiplying the probability of #cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity solutions in order to...
View ArticlePolymorphic security warnings more effective than same, static ones
In the last year or so, we have witnessed Google becoming increasingly interested in providing effective warnings that would spur users into making good decisions regarding the security of their...
View ArticleOpenSSL fixes serious denial-of-service bug, 11 other flaws
The mystery high-severity flaw that people were expected to be fixed in #openssl is no Heartbleed, but it is serious and users should update. Earlier this week, the OpenSSL Project advised users that...
View ArticleCISA Security Bill: An F for Security But an A+ for Spying
WHEN THE SENATE Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and...
View ArticleStealing Data From Computers Using Heat
AIR-GAPPED SYSTEMS, WHICH are isolated from the #internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make...
View ArticleApple quietly pulls anti-virus apps from App Store in negativity crackdown
#apple has pulled an unknown number of #mobile #security #apps from the iOS App Store as part of a new policy that takes exception to the ‘anti-virus’ and anti-malware’ software categories, Mac...
View ArticleBrandPost: The #1 Information Security Policy That IT Managers Would Change
There are a lot of frustrated IT managers out there. How do I know? Because a recent survey commissioned by Sungard Availability Services* revealed that the 1 thing IT managers said they would do if...
View ArticleFour advantages of an identity behavior-based approach to cybersecurity
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 percent from 2013 to 2014 and...
View ArticleDell support tool put PCs at risk of malware infection
Attackers could have remotely installed #malware on systems running a flawed #dell support tool used to detect customers’ products. A #security researcher discovered the flaw in November and reported...
View ArticleSecurity best practices for users is your first line of defense
Most CIOs are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe – chances are, you’re one of those. But there’s a glaring...
View ArticleResearcher finds backdoor opened by Dell`s helper app
A security researcher has discovered a serious bug in Dell System Detect, the software Dell users are urged to use to download the appropriate drivers for their machines. The flaw can be exploited by...
View ArticleZero day, Web browser vulnerabilities spike in 2014
The number of zero-day and Web browser vulnerabilities shot up in 2014, but overall software vendors are patching faster. The data comes from Secunia, a Danish security vendor that releases an annual...
View ArticleData lurking: How to protect your company against overlooked insider threats
Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system...
View ArticleAn SDN vulnerability forced OpenDaylight to focus on security
Open-source software projects are often well intended, but #security can take a back seat to making the code work. OpenDaylight, the multivendor software-defined networking (SDN) project, learned that...
View ArticleHundreds of Android and iOS apps are still vulnerable to FREAK attacks
Hundreds of #android and #ios apps are still vulnerable to a dangerous #attack revealed two weeks ago that can compromise encrypted data, a #security vendor said Tuesday. The apps have not yet been...
View ArticleMicrosoft and friends get Lenovo’s Superfish scourge under control
Microsoft says the Superfish adware that potentially exposed thousands of #lenovo PCs to man-in-the-middle attacks is well under control. To battle the Superfish #scourge, microsoft added automated...
View ArticleThe state of open source security
If there’s a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard...
View ArticleBrandPost: Top Five Security Risks with Windows Server 2003 EOL
Remember when #windows server 2003 debuted? A highlight that had us all excited were the advances in IT #security built in by design. We’re talking about a re-engineered Internet Information Services...
View ArticleHow companies are securing their cloud data
As companies accelerate their adoption of the cloud, the cloud data footprint is expected to grow to 6.5 zettabytes by 2018. This rapid migration of data into the cloud creates the need for insight...
View ArticleMost enterprise network teams now deal with security investigations
85 percent of enterprise network teams today are now involved with security investigations, indicating a major shift in the role of those teams within enterprises, according to Network Instruments....
View Article