72% of companies are not prepared for a data breach
EiQ Networks conducted a survey on information security priorities and challenges. Based on responses from 168 IT decision makers across industries, results point to lack of confidence in their...
View ArticleCyber attacks aren`t just targeting big business
81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues. The Endurance survey also found...
View ArticleApple security program, MacKeeper, celebrates difficult birthday
MacKeeper, a utility and #security program for #apple computers, celebrated its fifth birthday in April. But its gift to U.S. consumers who bought the application may be a slice of a $2 million...
View ArticleElectronic lock maker clashes with security firm over software flaws
The maker of a widely used electronic lock has taken issue with a #security company’s criticism of one of its flagship products. #ioactive, a Seattle-based security consultancy, published anadvisory...
View ArticleWindows 10 spells the end of Patch Tuesday
Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of Windows 10, security...
View ArticleLenovo Patches Vulnerabilities in System Update Service
Still reeling from the Superfish vulnerability, three more serious vulnerabilities have been patched and disclosed in #lenovo’s update system for its PCs. Researchers at IOActive yesterday disclosed...
View ArticleAttackers exploit vulnerabilities in two WordPress plugins
A vulnerability within two widely used #wordpress plugins is already being exploited by hackers, putting millions of WordPress sites at #risk, according to a computer #security firm. The plugins are...
View ArticleCompanies are falling behind on securing their SAP environments
More than 95 percent of #sap systems deployed in enterprises are exposed to #vulnerabilities that could lead to a full compromise of business #data, a #security firm claims. Onapsis, a Boston-based...
View ArticleWith Lock Research, Another Battle Brews in the War Over Security Holes
IN THE LATEST sign that the war between security researchers and the companies they investigate is heating back up, researchers who uncovered vulnerabilities in a brand of high-security electronic...
View ArticleThe Internet of Things to take a beating in DefCon hacking contest
Hackers will put Internet-connected embedded devices to the test at the DefCon 23 #security conference in August. Judging by the results of previous Internet-of-Things security reviews, prepare for...
View ArticleBrandPost: Five Questions CIOs Should Ask When Managing An IT Disaster...
Lately, we have often depicted CIOs as parachuting down to earth, with dubious levels of safety. But despite our potential overuse of this metaphor, I think it’s still apt, especially when describing...
View ArticleHacked advertising platform sent users to the Nuclear exploit kit
A suspected #malicious advertising #attack turned out to be a much deeper compromise of an online advertising company, according to Trend Micro. The #security company found that advertisements served...
View ArticleNew Linux rootkit leverages GPUs for stealth
A team of developers has created a rootkit for #linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden. The rootkit, called Jellyfish, is a...
View ArticleProof-of-concept rootkit proves malware can hide on graphics chips
A team of anonymous developers who recently created a Linux rootkit that runs on graphics cards has released a new proof-of-concept malware program that does the same on Windows. A Mac OS X...
View ArticleBeware the ticking Internet of Things security time bomb
IBM’s Andy Thurai didn’t quite put the words into former RSA CTO Deepak Taneja’s mouth, but did prompt him by asking at the start of a TIE Startup Con panel in Cambridge, Mass., earlier this month...
View ArticleIncreasing cloud adoption will drive IT innovation
DevOps is a software development and IT management method that brings software engineering, quality assurance, and IT operations together as an integrated team to collaboratively manage the full...
View ArticleAdd GitHub dorking to list of security concerns
One of the big lessons that we’ve learned in the last ten years is that even little pieces of once disparate data, gathered in a single location, can yield startling truths. With #facebook, that lesson...
View ArticleThe best way to protect passwords may be creating fake ones
#password managers are a great way to supply random, unique passwords to a high number of websites. But most still have an Achilles’ heel: Usually, a single master password unlocks the entire vault....
View ArticleFree tool reveals mobile apps sending unencrypted data
A surprising amount of #mobile #data still crosses the Internet unencrypted, and a new free app is designed to show users what isn’t protected. The program, called Datapp, comes from the University of...
View ArticleVenom vulnerability bares its fangs: Protect your data center with these patches
A critical vulnerability called Venom (Virtualized Environment Neglected Operations Manipulation) has been discovered by Jason Geffner at the #security firm CrowdStrike. The vulnerability is in a...
View Article