Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Cert-In Issues a Vulnerability Note for IE8

Posted By - ,

A use-after-free vulnerability has been reported in Microsoft Internet Explorer (IE) 8 which could allow an unauthenticated remote attacker to execute arbitrary code on a targeted system.

- Read Full Article - 0 Comments

FBI: Cyber's Ten Most Wanted List

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

The following persons top the Federal Bureau of Investigation’s Cyber Most Wanted list:

- Read Full Article - 0 Comments

Understanding Risk And Reward In Building Relationships

Posted By - Daniel Raskin, VP of Marketing

Recently, news of Target CEO Gregg Steinhafel’s resignation has prompted a lot of discussion around who is responsible when breaches occur, especially the relationship between the CEO, CIO and CSO.

- Read Full Article - 0 Comments

Apple Patches 21 Safari Vulnerabilities

Posted By - DynamicCISO,

Apple Inc. has released a few software updates for its Safari web browser addressing multiple Webkit vulnerabilities in Mac OS X. These updates will help Apple users with over 20 security patches. The bug, for which the updates have been pushed, resides in the Safari 7.0.4 for Mac OS X Mavericks 10.9.3 and Safari 6.1.4.

- Read Full Article - 0 Comments

F5 Networks Acquires Defense.Net, Inc.

Posted By - DynamicCISO,

F5 Networks has announced its acquisition of Defense.Net, Inc. a privately-held provider of cloud-based security services for protecting data centers and Internet applications from distributed denial-of-service (DDoS) attacks.

- Read Full Article - 0 Comments

Disclosing versus Hoarding Vulnerabilities

Posted By - Bruce Schneier, CTO

There's a debate going on about whether the US government -- specifically, the NSA and United States Cyber Command -- should stockpile Internet vulnerabilities or disclose and fix them. It's a complicated problem, and one that starkly illustrates the difficulty of separating attack and defense in cyberspace.

- Read Full Article - 0 Comments

Four Tips For Choosing The Best Anti-Virus Software

Posted By - Ryan Farmer, Marketing Manager

The consequences of not taking cyber security seriously are, for most business owners, too dire to contemplate. Suffering a serious breach, such as theft of users’ financial details from an eCommerce site, can have serious long-term consequences for a business – both in terms of reputation and financial health.

- Read Full Article - 0 Comments

Facebook Makes Malware Cleanup Easier with F-Secure and Trend Micro

Posted By - DynamicCISO,

Facebook has revealed that it will integrate anti-malware technologies from security technology majors Trend Micro and F-Secure into its services. This comes as an effort to help spot and clean infected machines logging in to the service.

- Read Full Article - 0 Comments

eBay Asking Users to Pick New Passwords Suspecting Data Breach

Posted By - DynamicCISO,

Online eCommerce giant eBay has urged customers to change their passwords after cyber criminals breached its databases, in what could be one of the biggest and worst attacks of its kind in recent times.

- Read Full Article - 0 Comments

AT&T Hacker Demanding Millions from the Government

Posted By - Rahul Neel Mani, Editor

Andrew 'weev' Auernheimer, who have provoked the US authorities to reform the Computer Fraud and Abuse Act (CFAA), wants the US Government to pay him $13 million for taking away his freedom for the past three years.

- Read Full Article - 0 Comments

CyberArk Simplifies Meeting PCI DSS 3.0 Compliance to Protect ‘Keys to IT Kingdom’

Posted By - DynamicCISO,

In the face of increasing cyber-attacks on the retail industry, CyberArk has released a white paper demonstrating how retailers can comply with the latest Payment Card Industry Data Security Standard (PCI DSS) regulations.

- Read Full Article - 0 Comments

Check Point's Revolutionary Cyber Intelligence Initiative: ThreatCloud IntelliStore

Posted By - DynamicCISO,

CheckPoint has announced the launch and immediate availability of ThreatCloud IntelliStore - a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks.

- Read Full Article - 0 Comments

100 Hackers Arrested by FBI over Blackshades Malware in a Global Raid

Posted By - DynamicCISO,

In nearly a dozen raids across the world in an action prompted by the US FBI, the police have been able to detain over 100 hackers behind 'RAT' software, which lets attackers take over Facebook accounts and infect their the PCs.

- Read Full Article - 0 Comments

U.S. Charges Five Chinese Military Hackers for Cyber Espionage

Posted By - DynamicCISO,

A grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries.

- Read Full Article - 0 Comments

Six Smartphone Security Mistakes Place Users At Risk

Posted By - Davis Joseph , Online Marketing Manager

Smartphones have revolutionized our lives. However, the growth of this technology has also brought privacy and security concerns. Whether it is a matter of personal data or the data of organizations, users need to be aware about how to optimize their use of smartphones. This includes avoid making some common mistakes while using one’s device.

- Read Full Article - 0 Comments

Police Website of City of Rawalpindi in Pakistan Hacked

Posted By - DynamicCISO,

Hackers took the website of Rawalpindi City police in Pakistan for a ride and hacked it. According to police officials, no sensitive data has been compromised so far.

- Read Full Article - 0 Comments

Trend Micro’s Q1 Security Roundup: Cybercriminal’s Advanced Methods for Executing Attacks on Wide Variety of Targets

Posted By - DynamicCISO,

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft as revealed in Trend Micro's first quarter security roundup for 2014, “Cybercrime Hits the Unexpected." Greed is motivating cybercriminals to take a non-traditional approach in the selection of unlikely targets.

- Read Full Article - 0 Comments

Google Fixes Three Major Flaws in Chrome

Posted By - DynamicCISO,

Google has patched three key security vulnerabilities in its browser Google Chrome in the new version which was released on Tuesday this week.

- Read Full Article - 0 Comments

Too Many Threats, Too Few Professionals

Posted By - Jason Waterman, Principcal Consultant

According to the Cisco Annual Security Report 2014, there are approximately one million unfilled Security jobs worldwide. The supposed ‘war on talent’ is nothing new, but to a lot of people data breaches and information security flaws are featuring in the mainstream news streams for the first time.

- Read Full Article - 0 Comments

Average Enterprise Generates 10,000 Security Events Per Day

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

According to findings in Damballa’s Q1 2014 State of Infections Report, average enterprise generates as many 10,000 security events per day, many of which require manual analysis to determine if there are early indicators of a compromise of systems.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All