Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Linux Australia breached, personal details leaked

The open-source and free software user group Linux Australia said personal information for attendees of two conferences it hosts may have been leaked after #malware was found on one of its servers. The...

View Article


Vulnerable Dell support tool now detected as risky software

Security vendor Malwarebytes has flagged the #dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at #risk. Last month a...

View Article


SingTel acquires TrustWave for managed security services

SingTel will acquire TrustWave Holdings, the largest U.S. independent provider of managed #security services, for $810 million, the companies said on Tuesday. SingTel, a large operator based in...

View Article

HP tells cybersecurity customers to focus on people and processes

To protect themselves against cyberattacks, organizations should focus more on training their employees and improving their internal processes instead of buying new technology, according to one tech...

View Article

Cyberattacks have ripple effects on partners, industries

Cyberattacks on one organization can have ripple effects that reach far beyond it, according to a new survey of C-level executives by Sunnyvale, Calif.-based #security vendor RedSeal, Inc. It’s a...

View Article


Collaboration and boundaries vital for new cybersecurity initiatives

Underscoring the seriousness of recent cyber-attacks, the Obama Administration is seeking to establish #cybersecurity standards and enact new federal laws to cover cybercrimes. The common thread...

View Article

Cloud computing brings changes for IT security workers

Watch out, computer #security professionals: #cloud computing vendors are coming for your jobs.It may be inevitable, or you may be able to take back control by rigorously studying how your organization...

View Article

In a mock cyberattack, Deloitte teaches the whole business how to respond

A #security #breach or big #data loss can trigger an emergency for the entire business, not just for the IT or security teams, so staffers from multiple departments must know how to react quickly and...

View Article


Large-scale Google malvertising campaign hits users with exploits

A large number of ads distributed by a #google advertising partner redirected users to Web-based exploits that attempted to install #malware on users’ computers. #security researchers from Dutch...

View Article


Police operation disrupts Beebone botnet used for malware distribution

Europol, in collaboration with Dutch authorities, the U.S. FBI and private #security companies, have seized the domain names used to control a botnet called #beebone. The police action Wednesday...

View Article

Botnet activity inside organisations predicts likelihood of future data breach

Organisations showing evidence of botnets inside their networks are not only more likely to suffer a data breach, the level of botnet activity correlates directly to increased risk, security analytics...

View Article

Email Phishing Attacks Take Just Minutes to Hook Recipients

IF YOU WORK in IT #security, you’ve got one minute and 20 seconds to save your company from being hacked. This is not a drill. It’s the median time it takes for an employee to open a phishing email...

View Article

Adobe patches 22 vulnerabilities in Flash Player

Flash Player 17.0.0.169 for Windows and Mac, Flash Player 11.2.202.457 for Linux and Flash Player Extended Support Release 13.0.0.281, address 22 mainly critical vulnerabilities, some of which can lead...

View Article


Perception and reality of perimeter security effectiveness

A widening gap emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing levels of investment in this area...

View Article

Internet of Everything attack surface grows

The proliferation of more than 16 billion connected computing devices today has significantly expanded the #attack surface of our interconnected world. Unauthorized, BYOD, vulnerable Internet of Things...

View Article


IBM opens up its threat data as part of new security intelligence sharing...

#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On...

View Article

Security analytics: The key for breach detection?

Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced attacks has reached...

View Article


Pawn Storm cyberspies still at work, target NATO and the White House

Pawn Storm, the long-standing economic and political #cyber-#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and...

View Article

Cyber Advanced Warning System sounds the alarm on security threats

NSS Labs, known for its independent testing of information-#security products, has been in the industry for many years. That longevity affords the company a unique perspective of today’s businesses and...

View Article

Key trends and opportunities in the information security profession

Companies and organizations are increasingly struggling to manage threats, avoid errors and are taking longer to recover from cyberattacks. The results of the (ISC)2 Global Information #security...

View Article
Browsing all 2490 articles
Browse latest View live