Linux Australia breached, personal details leaked
The open-source and free software user group Linux Australia said personal information for attendees of two conferences it hosts may have been leaked after #malware was found on one of its servers. The...
View ArticleVulnerable Dell support tool now detected as risky software
Security vendor Malwarebytes has flagged the #dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at #risk. Last month a...
View ArticleSingTel acquires TrustWave for managed security services
SingTel will acquire TrustWave Holdings, the largest U.S. independent provider of managed #security services, for $810 million, the companies said on Tuesday. SingTel, a large operator based in...
View ArticleHP tells cybersecurity customers to focus on people and processes
To protect themselves against cyberattacks, organizations should focus more on training their employees and improving their internal processes instead of buying new technology, according to one tech...
View ArticleCyberattacks have ripple effects on partners, industries
Cyberattacks on one organization can have ripple effects that reach far beyond it, according to a new survey of C-level executives by Sunnyvale, Calif.-based #security vendor RedSeal, Inc. It’s a...
View ArticleCollaboration and boundaries vital for new cybersecurity initiatives
Underscoring the seriousness of recent cyber-attacks, the Obama Administration is seeking to establish #cybersecurity standards and enact new federal laws to cover cybercrimes. The common thread...
View ArticleCloud computing brings changes for IT security workers
Watch out, computer #security professionals: #cloud computing vendors are coming for your jobs.It may be inevitable, or you may be able to take back control by rigorously studying how your organization...
View ArticleIn a mock cyberattack, Deloitte teaches the whole business how to respond
A #security #breach or big #data loss can trigger an emergency for the entire business, not just for the IT or security teams, so staffers from multiple departments must know how to react quickly and...
View ArticleLarge-scale Google malvertising campaign hits users with exploits
A large number of ads distributed by a #google advertising partner redirected users to Web-based exploits that attempted to install #malware on users’ computers. #security researchers from Dutch...
View ArticlePolice operation disrupts Beebone botnet used for malware distribution
Europol, in collaboration with Dutch authorities, the U.S. FBI and private #security companies, have seized the domain names used to control a botnet called #beebone. The police action Wednesday...
View ArticleBotnet activity inside organisations predicts likelihood of future data breach
Organisations showing evidence of botnets inside their networks are not only more likely to suffer a data breach, the level of botnet activity correlates directly to increased risk, security analytics...
View ArticleEmail Phishing Attacks Take Just Minutes to Hook Recipients
IF YOU WORK in IT #security, you’ve got one minute and 20 seconds to save your company from being hacked. This is not a drill. It’s the median time it takes for an employee to open a phishing email...
View ArticleAdobe patches 22 vulnerabilities in Flash Player
Flash Player 17.0.0.169 for Windows and Mac, Flash Player 11.2.202.457 for Linux and Flash Player Extended Support Release 13.0.0.281, address 22 mainly critical vulnerabilities, some of which can lead...
View ArticlePerception and reality of perimeter security effectiveness
A widening gap emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. Gemalto research shows increasing levels of investment in this area...
View ArticleInternet of Everything attack surface grows
The proliferation of more than 16 billion connected computing devices today has significantly expanded the #attack surface of our interconnected world. Unauthorized, BYOD, vulnerable Internet of Things...
View ArticleIBM opens up its threat data as part of new security intelligence sharing...
#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On...
View ArticleSecurity analytics: The key for breach detection?
Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced attacks has reached...
View ArticlePawn Storm cyberspies still at work, target NATO and the White House
Pawn Storm, the long-standing economic and political #cyber-#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and...
View ArticleCyber Advanced Warning System sounds the alarm on security threats
NSS Labs, known for its independent testing of information-#security products, has been in the industry for many years. That longevity affords the company a unique perspective of today’s businesses and...
View ArticleKey trends and opportunities in the information security profession
Companies and organizations are increasingly struggling to manage threats, avoid errors and are taking longer to recover from cyberattacks. The results of the (ISC)2 Global Information #security...
View Article