Organizations lack control over mobile workspaces
More than 64 percent of respondents to a SANS survey said a majority of their #mobile workforce can access their organizations’ secure data remotely, yet less than 25 percent said sufficient...
View ArticleJapan’s Alsok to launch warning system for unwelcome drones
Burglar alarms could soon incorporate #drone-detection #technology if a new service from a Japanese #security company is anything to judge by.Tokyo-based Sohgo Security Services, also known as Alsok,...
View ArticleAPT group`s malware retrieved C&C IP addresses from Microsoft`s TechNet portal
A China-based APT group has been using #microsoft’s TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE #malware, FireEye researchers have revealed. “While other...
View ArticleChina-based hackers used Microsoft’s TechNet for attacks
#microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to #security vendor FireEye. The group, which FireEye calls...
View ArticleIDG Contributor Network: Re-thinking doctor-patient communications in the...
Within business, #healthcare and our social lives, #email has become a preferred form of communication. Somewhere between the ubiquity of access and habits developed over years of use, we face the...
View ArticleSecurity researcher’s hack caused airplane to climb, FBI asserts
The FBI contends a cybersecurity researcher said he caused an airplane’s engine to climb after hacking its software, according to a court document. The researcher, Chris Roberts, was questioned by the...
View ArticleResearchers Disclose Further Vulnerabilities in Google App Engine
A Polish research group claims there are still several outstanding vulnerabilities in Google App Engines for Java, including three complete Java sandbox escapes. After three weeks of radio silence from...
View Article5 tips to comply with the new PCI requirements
At the end of June, merchants that accept payment cards have five new #security requirements to comply with — and significant fines and other costs if they don’t. The new rules are part of the new...
View ArticleUK design firm shows off ‘Shadowire’– is this the answer to USB security woes?
Famous UK house of invention Cambridge Consultants has this week showcased a clever new #technology that can be used to transfer encrypted files between computers without the drawbacks of insecure #usb...
View ArticleResearcher invents fake password technology to confuse hackers
A team of researchers has developed a system that makes it much harder for hackers to obtain usable passwords from a leaked database, which could help blunt the damage from data breaches. Called...
View ArticleHackers breached subsea cable operator Pacnet`s corporate IT network
Global telecommunications service provider and fibre optic subsea cable operator Pacnet has suffered a breach: unknown hackers have gained access to its corporate IT network last month. It’s...
View ArticleSt. Louis Federal Reserve forces password change after DNS attack
A branch of the U.S.’s central bank is forcing a #password reset after a cyberattack briefly redirected visitors to parts of its website to bogus Web pages. The Federal Reserve of St. Louis found on...
View ArticleNew Critical Encryption Bug Affects Thousands of Sites
A new and critical #vulnerability uncovered by #security researchers would allow an #attacker to intercept and decrypt secured communications exchanged between users and thousands of web sites and mail...
View ArticleUS proposes tighter export rules for computer security tools
The U.S. Commerce Department has proposed tighter export rules for computer #security tools, a potentially controversial revision to an international agreement aimed at controlling weapons #technology....
View ArticlePersonal info of 1.1M customers stolen in CareFirst breach
CareFirst, a Blue Cross Blue Shield plan, has announced that they have suffered a #breach in which the attackers gained access to one of their databases. “Evidence suggests the attackers could have...
View ArticleNew protocol from Guardtime hopes to unseat RSA for authentication, digital...
#data integrity vendor Guardtime hopes its newly announced protocol will replace RSA for the purposes of authentication and digital signatures, touting it as easier to manage and less vulnerable to...
View ArticleAccount recovery via secret questions is a bad idea
Secret questions offer far lower #security than user-chosen passwords, and should never be used as the only way to reclaim access to a lost account, #google researchers have confirmed. After having...
View ArticleSecom security drone follows, photographs intruders
If you think #drones are more than slightly creepy, wait until you meet one that will autonomously follow you and record video.Japanese #security company Secom is launching a drone that will...
View ArticleFreelance hacking site vows to clean up dodgy listings
Charles Tendell is trying to repair a reputation problem for his website, Hacker’s List.The site debuted in November and quickly drew high-profile attention, including a front-page story in the New...
View ArticleAndroid’s reset function fails to delete data from Samsung and HTC smartphones
The built-in factory reset on #android smartphones is so poorly implemented on some popular models it should never be relied on to erase sensitive #data, the Asset Disposal & Information #security...
View Article