Travel smart: Tips for staying secure on the road
Whether you’re taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming...
View ArticleSniffing and tracking wearable tech and smartphones
Researchers at Context Information #security have demonstrated how easy it is to monitor and record #bluetooth Low Energy signals transmitted by many #mobile phones, wearable devices and iBeacons,...
View ArticleAttackers use email spam to infect point-of-sale terminals with new malware
Cybercriminals are targeting employees who browse the Web or check their #email from point-of-sale (PoS) computers, a risky but unfortunately common practice. Researchers from #security firm FireEye...
View ArticleWhy insider threats are succeeding
Data leaks and other news events over the past few years have brought insider threats to the forefront of public attention, but most companies still lack the means or motivation to protect themselves...
View ArticleWebroot: Deliver collective threat intelligence in near real-time
“#threat intelligence is useless to most organizations if all it does is generate more alerts,” said Webroot CMO David Duncan is a recent Q&A. “Threat intelligence has to detect threats in real...
View ArticlemSpy finally admits they`ve been hacked
After having first denied that they suffered a breach and had their customer’s #data stolen and leaked on the Dark Web, mobile spyware maker #mspy has finally admitted that the incident happened, but...
View ArticleBreach detection: Five fatal flaws and how to avoid them
When the Sarbanes-Oxley Act of 2002 was passed, it fell on corporate security teams to translate its requirements into technical controls. That threw the IT Security function into the deep end of the...
View ArticleHybrid cloud startup Rubrik releases backup appliance, bags $41m more funding
#rubrik,which promises all-in-one approach to enterprise backup and recovery, announced its Converged #data Management platform in late March along with its initial funding. The technology aims to...
View ArticleResearchers Exploit Patched Windows Group Policy Bug
Researchers from Core #security were able to exploit a security vulnerability in #windows Group Policy — MS15-011 — that was patched in February by #microsoft. Nicolas Economou, a senior exploit...
View ArticleHow businesses can stem the flow of leaky data
The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, targeted attacks, to new...
View ArticleSolving the cybersecurity challenges of smart cities
Backed by leading IT security researchers, companies and organizations, including IOActive, Kaspersky Lab, Bastille, and the #cloud Security Alliance, the global Securing Smart Cities initiative aims...
View ArticleAndroid applications can secretly track location using Wi-Fi data
Many #android #applications collect information on Wi-Fi access points, which researchers contend can be used to figure out where a person is more than 90 percent of the time. The privacy implications...
View ArticlePhishers register domain names, hammer traditional targets
The number of domain names used for #phishing reached an all-time high, according to a new report by the the Anti-Phishing Working Group (APWG). Many of these were registered by Chinese phishers, who...
View ArticleHow your employees put your organization at risk
#security is, of course, a major concern for most companies, but it’s often seen as an outside #threat. But it turns out that employees are one of the biggest security threats, and apparently most...
View ArticleComplex security solutions are exposing companies to risk
Companies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software...
View ArticleUber to tweak privacy policy so it can better understand you and your friends
Uber Technologies is set to tweak its #privacy #policy so it can access a rider’s location when the Uber app is running in the background. The change in policy will also allow it to send special offers...
View ArticleFacebook tests new "Security Check" tool to fend off account hijacking
Ever worried that someone else might access your Facebook account? Facebook helps with this – as well as Google, PayPal and plenty of other platforms, Facebook can send alerts any time there’s a new...
View ArticleSecurity Firm Redefines APT: African Phishing Threat
A #security firm made headlines earlier this month when it boasted it had thwarted plans by organized Russian cyber criminals to launch an #attack against multiple US-based banks. But a closer look at...
View ArticlePhishing Gang is Audacious Manipulator
Cybercriminals who specialize in phishing — or tricking people into giving up usernames and passwords at fake bank and ecommerce sites — aren’t generally considered the most sophisticated crooks, but...
View ArticleExposing the vulnerabilities in Oracle PeopleSoft applications
During his talk at the #hack in the Box conference, Alexey Tyurin, Head of the Oracle Security Department at ERPScan, spotlighted several vulnerabilities in Oracle PeopleSoft applications. Oracle is...
View Article