Three strategies for the new era of enterprise cybersecurity
The pace of change for Information Technology is challenging established notions of “What is IT?” and “What is Information Security in the modern age?” For one example, the “new” data center...
View ArticleWill Security Match Up to The World Cup’s Cyber Threats?
The World Cup kicked off last Thursday, marking the beginning point of more than a month of futbol hysteria. The World Cup is the most watched event on the planet and the runner up isn’t even close....
View ArticleWill full encryption sideline Google’s targeted ads?
Mining personal data to deliver targeted ads is the lifeblood of Google’s business — and of many other online firms.
View ArticleIdentifying Mobile Blind Spots
Until We Know What is Occurring on Devices, We Cannot Determine if Our Controls are Effective at Managing Risk…
View ArticleZbot Variant Poorly Detected by AV Engines
A security researcher encountered a threat sample identified as Zbot by five of the 52 engines availableon VirusTotal.Zbot, also known as Zeus, is a Trojan designed for data stealing purposes, focusing...
View ArticleFake Google Play App Steals Private Information
A new threat for Android devices emerges, as researchers have found a Google Play clone that can send text messages, signature certificates, and bank passwords to Gmail accounts. FireEye researchers...
View ArticleEurope’s highest court to rule on Facebook NSA data-sharing case
The NSA’s mass surveillance program could change Europe and the US’s 2000 Safe Harbour agreement.
View ArticleEurope’s highest court to rule on Facebook privacy case
The NSA’s mass surveillance program could change Europe and the US’s 2000 Safe Harbour agreement.
View ArticleCloudFlare acquires VPN service CryptoSeal, shuts it down
CloudFlare acquires VPN startup, closes it down but keeps hold of its Trusted Computing technology.
View ArticleAuthentication Tokens Found in App Source Codes by the Thousands
Custom crawler PlayDrone was used by researchers to download and decompile over 880,000 free programs to find thousands of secret tokens that authenticate service to service communication embedded in...
View Article7 Million+ Cards Likely to Have Been Stolen in P.F. Chang’s Breach
The computation took into consideration the possibility that the companys restaurants had in fact been leaking credit card data for a period of nine months, since September 2013.According to...
View ArticleLinkedIn called out on slow implementation of default SSL
LinkedIn said it is making progress implementing default encryption of data exchanged with its users after a security company alleged some users are still at risk of account takeovers.
View ArticleSimplocker Changes Attack Vectors
Despite the simplicity publicized by various security researchers and the fact that there are solutions to reverse its malicious activity, Simplocker has seen an increase in distribution. Robert...
View ArticleCyber attack caused realtor.com and Top Producer outages: Move
A “distributed denial of service attack” bombarded realtor.com and other websites operated by Move Inc. with “massive amounts of traffic” causing the extended outages experienced Wednesday, Move said .
View ArticleEmail Breaches Expose Over 37,000 People’s Data at California Colleges
Names, Social Security numbers and birthdates were exposed, along with a variety of other information.
View ArticleTop 5 Most Notorious Computer Hackers
In the computer security world, a hacker is basically someone who seeks and exploits weaknesses in a computer system or computer network.
View ArticleLinkedIn Responds to Criticism of its SSL Implementation
LinkedIn said that a majority of its users are not affected by the SSL issue reported by security company Zimperium. According to Zimperium, an attacker could launch a man-in-the-middle [MITM] attack...
View ArticleHong Kong pro-democracy tabloid blames Beijing for cyber-attack
A leading Hong Kong pro-democracy newspaper blamed Beijing on Thursday for a massive cyber-attack on its website, just days after a series of similar attacks on an online vote on electoral reform.
View ArticleGoogle’s backward step on Android app privacy
The latest changes to Android’s app permissions takes a broken model and makes it worse. It’s time for a complete overhaul.
View ArticleRussia’s Hacker Collective That Wasn’t
Who is backing Russia’s newest “hacker” group, named after “Humpty Dumpty”? Who’s the intended audience for their activity? Images mixed by author.
View Article