The challenges of implementing tokenization in a medium-sized enterprise
We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary target was Social...
View ArticleGovernment asks bidders on hack contract: Can your company host and protect...
The government plans to award a sweeping five-year contract in August to a private company to monitor the hacked security clearance data of 21.5 million people for identity theft — and ensure that the...
View ArticleFinally! A free, open source, on-premise virus scanner framework
After having spoken about it for quite a while, security researcher Robert Simmons has finally begun publishing the code and documentation of his open source AV scanner framework dubbed PlagueScanner....
View ArticleThe ABC of Information Security
When talking about the types of information security issues that companies have to deal with, there are so many areas to look at that, at times, it can seem difficult to know where to start. While...
View ArticleThe business payment security survival guide
A #business #payment #security survival #guide is a useful tool for small businesses. Anyone looking to start an #online store, or already established businesses trying to countercheck or improve their...
View ArticleAre contactless payments safe?
“Your total is $12.95,”says the cashier at the local supermarket. I take out my wallet to perform a familiar tap on the POS terminal, wait a second, then hear the beep and – voila! – the transaction is...
View ArticleNational Guard to Establish Cyber Protection Team
Army General Frank J. Grass, National Guard Bureau Chief and member of the Joint Chiefs of Staff, announced plans to form the National Guard Cyber Protection Team, which will establish a cyber-defense...
View ArticleA New Hope for Victims of Data Breaches
A federal court gave new hope this month to victims of data breaches. In the past, most class-action lawsuits filed by victims have been dismissed by courts due to lack of standing—although a victim’s...
View ArticleBalance security and convenience with Windows 10’s Wi-Fi Sense
According to one report, as of the morning of July 31, 2015, two days after it was made available, Microsoft Windows 10 had been installed on over 67 million PCs. No matter how you slice it, that’s a...
View ArticleSecurity Trends That Dominate 2015
The latest type of security exploits target connected cars and airplanes. Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since...
View ArticleWhat is the core idea behind applying ISO 27001?
The dynamic environment of security risks is a place of constant change, where new threats develop, vulnerabilities are discovered, and security incidents arise with major repercussions, both for...
View ArticleBlack Hat USA 2015: The full story of how that Jeep was hacked
Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail, how exactly...
View ArticleBlackhat USA and Defcon 2015
Blackhat and Defcon 2015 are being held in Las Vegas this year in the Mandalay Bay and Paris hotels, with 9,000 people in Blackhat attendance and more at Defcon. While attending Blackhat is far more...
View ArticleMobile threat intelligence is a boon, but beware of information overload
As mobile devices increasingly become the target of security threats, some organizations are applying cyber security tools specifically for threat intelligence. This provides real-time data feeds about...
View ArticleAir gapped computers – security issues
The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized...
View ArticleWindows and UEFI anti-theft mechanism makes systems less secure
With the litany of free trial programs, adware, and other unwanted “features” that come with the factory images of Windows computers, it has become standard procedure for many users to wipe the system...
View Article10 security technologies destined for the dustbin
Perhaps nothing, not even the weather, changes as fast as computer #technology. With that brisk pace of #progress comes a grave responsibility: securing it. Every wave of new tech, no matter how small...
View ArticleSecurity and the Internet of Things – Are We Repeating History?
The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our everyday...
View ArticleKeyless Cars: A New Frontier For Bug Bounties?
Convenience always seems to come at a cost and never more so than with the keyless car. News emerged last week that car manufacturers using the Megamos Crypto transponder electronic vehicle...
View ArticleOuch! Feeling The Pain Of Cybersecurity In Healthcare
There’s no vaccination that can stem the outbreak of recent healthcare-related data breaches. If anyone needs a reminder about why medical records are increasingly a target, just thumb through all the...
View Article