The portable secure desktop: tVolution Mini
At the RSA Conference 2015 Becrypt launched tVolution Mini. The device is smaller than a mobile phone, but has the power of a PC, and transforms a monitor or TV into a smart device for securely...
View ArticleCyber extortion: A growth industry
The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you’re doing is encouraging more extortion. And you don’t even...
View ArticleRussian hackers wield Flash, unpatched Windows zero-day flaws
A fresh #attack by a long-known hacking group suspected to be linked with Russia did little to mask its activity in an attack a week ago. The computer #security firm FireEye wrote on Saturday that the...
View ArticleRadware launches hybrid cloud based WAF service
Cyber attacks remain a persistent threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web attack vectors, increasing in popularity....
View ArticleEU accused of watering down General Data Protection Regulation
European Union data-protection reform proposals could undermine basic privacy rights globally, a growing chorus of critics say. More than 60 civil rights groups from all corners of the world including...
View ArticleMicrosoft moves to address customers’ concerns about cloud control and...
#microsoft is working on new features for its Office 365 #cloud service designed to give customers more control over their #data and more visibility into how it’s being accessed. The company will...
View ArticleHouse Passes Cybersecurity Bill Despite Privacy Protests
CONGRESS IS HELLBENT on passing a cybersecurity bill that can stop the wave of hacker breaches hitting American corporations. And they’re not letting the protests of a few dozen privacy and civil...
View ArticleSony hackers targeted employees with fake Apple ID emails
Hackers probably gained access to Sony’s network last year after a series of #phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a...
View ArticleThe international effort to confront international cybercrime
Cybercriminals obviously do not respect international borders. So it should be equally obvious that the effort to defeat or even slow them down is going to take an international effort, involving both...
View ArticleFlaw on eBay’s Magento platform lets hackers attack web stores
Those using Magento’s e-commerce platform should ensure they’re using its latest software, as attackers are increasingly exploiting a flaw patched two months ago, security companies warned. The...
View ArticleHow to calm your board’s nerves about cybersecurity
Keith Turpin has seen some dire mistakes made in front of boards of directors, especially when #cybersecurity is on the agenda.”I’ve seen people go into board meetings with a network diagram,” says the...
View ArticleDon’t count on people to prevent data breaches
Your company has been breached and your executives are in denial. That is the phrase that came to mind the other day during breakfast at RSA with Intel’s #security organization where I overheard the...
View ArticleSecureDoc Cloud removes security concerns related to cloud file sharing
WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc Cloud leverages WinMagic’s...
View ArticleTruth #1 – Security Isn’t Just About Things. It’s About People.
It shouldn’t come as a shock that in a recent CIO.com study on What Keeps CIOs Awake at Night, #security planning is listed as the lowest priority for budget cuts in 2015. Here’s why: it seems that...
View ArticleBig Data and analytics are changing the cybersecurity landscape
Stealing media headlines with a new breach almost every week, cybersecurity has skyrocketed to the top of boardroom discussion agendas. Yet an average of 35 percent of all cyberattacks still go...
View ArticleWordPress quickly patches second critical vulnerability
WordPress patched a second critical #vulnerability in its Web publishing platform on Monday, less than a week after fixing a similar problem.Administrators are advised to upgrade to WordPress version...
View ArticleClick-fraud malware now used for Russian propaganda
#malware typically used artificially inflate advertising revenues is now being used to promote Russian propaganda on the Dailymotion video site, according to a report released today by Trustwave....
View ArticleThreats on government networks remain undetected for 16 days
Government cyber security professionals estimate that cyber threats exist on their networks for an average of 16 days before they are detected – hiding in plain sight. The good news is that 86 percent...
View ArticleRSA president questions government’s role in cybersecurity
The president of one of the world’s biggest computer #security vendors says he is skeptical that a stronger #government role in cyberdefense will abate the growing number of attacks. In an interview...
View ArticleGoogle develops new defense against phishing
#google has developed a new extension for its Chrome browser that aims to stop people from falling prey to #phishing sites. The free Password Alert extension stores an encrypted version of a person’s...
View Article