Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Kaspersky Lab Consumer Security Risks Survey Reports Careless Activity Over Social Media Networks

Posted By - DynamicCISO,

Kaspersky Lab has released its global Consumer Security Risks Survey for 2014, which covers various concerns and behaviors of the modern Internet user. In fact, according to the results, only a small number of respondents understand the risks associated with active use of social networks.

- Read Full Article - 0 Comments

Google Preparing for Safer Global Email

Posted By - DynamicCISO,

Last week the Google researchers posted an offical blog written by Mark Risher, Spam & their Abuse Team in which they bloggers outlines a vision and strategy to offer a safer global email. The team is excited about the new capabilities and wants to ensure they aren't abused by anyone trying to send misleading messages.

- Read Full Article - 0 Comments

SUPERVALU Notifies Customers of Criminal Computer Intrusion at Some of Its Owned and Franchised Stores

Posted By - DynamicCISO,

SUPERVALU, a Grocery giant in the US has announced that it experienced a criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores.

- Read Full Article - 0 Comments

Fragmentation and the Android Ecosystem

Posted By - Yonni Shelmerdine, Mobile Security Trends Analyst, Lacoon

What is fragmentation, and how does it affect the security of the Android-based devices? The most commonly used term to describe Android’s diversity is “Fragmentation”. The Android ecosystem is built up from many different developers, manufacturers and carriers, each with their own input and influence on the phones we use.

- Read Full Article - 0 Comments

Malware Analysis of the Lurk Downloader

Posted By - DynamicCISO,

Malware is constantly evolving to stay one step ahead of computer security researchers and law enforcement. Lurk is a malware downloader that uses digital steganography: the art of hiding secret information within a digital format, such as an image, audio, or video file.

- Read Full Article - 0 Comments

IBM Acquires Cloud Security Services Provider Lighthouse Security Group

Posted By - DynamicCISO,

IBM yesterday announced it has acquired the business operations of Lighthouse Security Group, LLC, a premier cloud security services provider. Lighthouse Security Group’s Gateway platform protects identity and data in an increasingly complex IT environment

- Read Full Article - 0 Comments

Gemalto to Acquire SafeNet, the Global Player in Data and Software Protection

Posted By - DynamicCISO,

Gemalto, a Dutch global player in digital security announced that it has signed a definitive agreement to acquire 100% of the share capital of SafeNet, another global player in data protection and software monetization, from Vector Capital for US$890 million on a debt free/cash free basis.

- Read Full Article - 0 Comments

Is £266 Billion Just the Tip of the Cybercrime Iceberg?

Posted By - Mark Sparshott, EMEA Director, Proofpoint

Recently security vendor McAfee released a research revealing cybercrime costs the global economy £266 billion each year. While this is a very big number for the annual economic impact of cybercrime, is there a possibility we will look back two years from now and realise that this was just the tip of the cybercrime iceberg?

- Read Full Article - 0 Comments

Over a Billion Passwords Stolen?

Posted By - Bruce Schneier, CTO

I've been doing way too many media interviews over this weird New York Times story that a Russian criminal gang has stolen over 1.2 billion passwords. As expected, the hype is pretty high over this. But from the beginning, the story didn't make sense to me.

- Read Full Article - 0 Comments

NSS Labs’ Cyber Resiliency Center Empowers Cyber Risk Management

Posted By - DynamicCISO,

NSS Labs has announced its new NSS Cyber Resiliency Center (CRC), which helps enterprises to manage their cyber risk. This first-of-its-kind SaaS offering enables CIOs and CISOs to continually evaluate their security posture, identify which threats target their applications and bypass their security controls.

- Read Full Article - 0 Comments

You Have Been Hacked: Hold Security Report Reveals Big Claims

Posted By - DynamicCISO,

In the latest development, Hold Security’s Deep Web Monitoring practice discovered what could be arguably the largest data breach known to date. After more than seven months of research, Hold Security identified a Russian cyber gang which is currently in possession of the largest cache of stolen data.

- Read Full Article - 0 Comments

Cisco Midyear Security Report Highlights Weak Links in Increasingly Dynamic Threat Landscape

Posted By - DynamicCISO,

The Cisco 2014 Midyear Security Report examines threat intelligence and cybersecurity trends for the first half of 2014 and was developed by security research experts who are part of the Cisco Collective Security Intelligence (CSI) ecosystem.

- Read Full Article - 0 Comments

Get Your Employees On-Board With Monitoring

Posted By - Rob Williams, CMO, SpectorSoft

While monitoring employee activities is one of the most effective ways of protecting IP and enforce acceptable use policies, many employers hesitate to use this approach. Oftentimes, executives worry that the potential for decreased employee satisfaction and trust might outweigh the security afforded by greater visibility.

- Read Full Article - 0 Comments

Top Paid and Free Apps Put Confidential and Sensitive Corporate Data at Risk: Appthority Report

Posted By - DynamicCISO,

Appthority's new summer 2014 App Reputation Report analysing the most popular iOS and Android apps for hidden security and privacy risks and identifies the top ten riskiest mobile app behaviours that threaten the enterprise and are found in 99 percent of the most popular free iOS and Android apps.

- Read Full Article - 0 Comments

Kaspersky Lab Reports Crouching Yeti: An Ongoing Surveillance Campaign with Over 2,800 Highly Valuable Targets Worldwide

Posted By - DynamicCISO,

Kaspersky Lab has released an in-depth analysis of the malware and command and control (C&C) server infrastructure related to the cyber-espionage campaign known to the Company’s Global Research and Analysis Team as the Crouching Yeti.

- Read Full Article - 0 Comments

Hackers Scanning Corporate Systems for Remote Access Software Made by Apple, Google, Microsoft etc.

Posted By - DynamicCISO,

he Homeland Security Department, in a new report, warns that hackers are scanning corporate systems for remote access software — made by companies like Apple, Google and Microsoft — that allows outside contractors and employees to tap into computer networks over an Internet connection.

- Read Full Article - 0 Comments

Microsoft Announces Enhanced Mitigation Experience Toolkit (EMET) 5.0

Posted By - DynamicCISO,

Microsoft has announced the general availability of EMET 5.0 - a free tool designed to help customers with their defense in depth strategies against cyberattacks, by helping detect and block exploitation techniques that are commonly used to exploit memory corruption vulnerabilities.

- Read Full Article - 0 Comments

Proliferation of Cybercrime Increases Risks to Public Safety and National Security

Posted By - DynamicCISO,

Truth Labs, India’s first independent Forensic Science Lab, reiterates linkages between the proliferation of cybercrime through the use of pirated and counterfeit software to the breaches in the security that eventually lead to threats to Public Safety and National Security.

- Read Full Article - 0 Comments

Bring Your Own Device (BYOD) to Track Assets

Posted By - Brian Sutter, Director of Marketing, Wasp Barcode Technologies

Technology continues to revolutionize the way companies do business.Nowhere is this seen more than in the devices used by employees to complete their work. Gone are the days of completing work tasks using only the computer provided by an employer.

- Read Full Article - 0 Comments

ICANN Tells U.S. Court That Country Code Top Level Domains Can't be Considered "Property"

Posted By - DynamicCISO,

The Internet Corporation for Assigned Names and Numbers (ICANN) has told a U.S. federal court in the District of Columbia, that a country code Top-Level Domain (ccTLD) cannot be considered "property," and thus cannot be attached by plaintiffs in a lawsuit.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All