Five cyber spy technologies that cannot be stopped by going offline
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well known to any teenager today. No software barriers can fully...
View ArticleUnpatched OS X, iOS flaws allow password, token theft from keychain, apps
Six researchers from Indiana University Bloomington, Peking University and Georgia Tech have recently published a paper in which they detail the existence of critical security weaknesses in Apple’s OS...
View ArticleLastPass users need to change their passwords immediately
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless it is hacked. In...
View ArticleObama backs OPM director as agency sends questionable email notifications
Since the monumental data breaches at the Office of Personnel Management (OPM) were first announced, a variety of reactions have come from legislators, but now the loudest among them are the calls for...
View ArticleHow CISOs can create security KPIs and KRIs
If your information security function is like most, it develops copious amounts of data about the business’s security that it delivers on a regular basis. And typically it never gets read. “There’s a...
View ArticleNearly half of 1,000 Leading Websites Fail Online Security and Privacy...
Some 46% of leading global websites have been found vulnerable to existing online security threats, according to Online Trust Alliance’s (OTA) annual audit of nearly 1,000 sites including leading...
View Article45% of ex-employees continue to have access to confidential corporate data
With the current situation experienced by the labor market, it is essential for companies to take steps in order to maintain their security in face of the movements which may occur in their workforces....
View ArticleSecurity updates for OS X, iOS fix bucketload of serious bugs
Apple has released security updates for Safari, OS X Yosemite (and previous OS X versions), and iOS. The OS X update contains fixes for 77 vulnerabilities, many of which can be exploited by attackers...
View ArticleChina’s New Security Law is Retort for U.S. Sanctions Policy
In late June, China’s government (PRC) passed sweeping legislation that reinforces government controls over cyber space. Specifically, the law addressed strengthened management over the web, and...
View ArticleDyre infections surge, variants spread through Windows exploit
Dyre infections have surged and new variants of the banking Trojan are being spread through exploitation of a Microsoft Windows bug, CVE-2015-0057, which has a patch, two security firms have found....
View ArticleArchuleta could not overcome loss of confidence following cyber thefts
(Drew Angerer/Getty Images) For Sen. Mark Warner it wasn’t the crime as much as the counter-punch that finished Katherine Archuleta. After five weeks of increasing heat over revelations about the...
View ArticleSame-Password Curse: Users Hesitate to Strengthen Passwords, Yet Fear Hackers
Consumers are reluctant to protect their accounts with multiple strong passwords, yet they worry weak ones will leave them vulnerable to hackers, multiple studies show. Out of a lack of awareness or a...
View ArticleMicrosoft Security Updates July 2015
Microsoft releases a long list of updates to multiple technologies today with 14 Security Bulletins (MS15-058, MS15-065 – MS15-077) patching 58 vulnerabilities, and at least 47 of them reported through...
View ArticleUnderstanding PCI compliance fines: Who is in charge of enforcing PCI?
If your business stores, processes, or transmits data from payment cards, then you are subject to the requirements of the PCI DSS. This set of security controls is designed to help merchants combat...
View ArticleFederal personnel files still very vulnerable and ‘prime targets’ for...
An audit due out Friday found 3,000 “critical” and “high-risk” vulnerabilities in three key bureaus at the Interior Department, the agency hosting the hacked personnel files of 4.2 million federal...
View ArticleLack of digital talent adds to cybersecurity problems
A big problem exposed by a massive data breach at the Office of Personal Management (OPM) is the woeful state of the federal government’s cybersecurity. It’s not comforting when the Obama...
View ArticleDrones and security: where are we heading?
Recently I had the opportunity to attend the Changellenge Cup Russia 2015 student project competition. I was on the panel of judges for one of the sections. But today we will not speak of the contest...
View ArticleHow to apply threat intelligence feeds to remediate threats
IT organizations are recognizing the value of threat intelligence feeds, and that’s good. Threat intelligence is a must-have for identifying malware and other threats that evade preventive security...
View ArticleSecurity pros issue comments before Wassenaar Arrangement deadline
The call for comments on the Wassenaar Arrangement closed on Monday after multiple heavy-hitting tech experts and companies filed their responses, which included calls for amendments to the rules and...
View ArticleGoogle Chrome update includes 43 security fixes
Google has released Chrome version 44.0.2403.89 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow an attacker to take control of an...
View Article