Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Facebook to Let Users Log into Third-party Apps Anonymously

Posted By - DynamicCISO,

Facebook has introduced Anonymous Login for third-party apps. With Anonymous Login, users can login to new apps without having to create a new account. The feature which is available on both web and mobile is specially for those users who are not comfortable to sign in by providing real information.

- Read Full Article - 0 Comments

Executive Cyber Intelligence Report May 2014: Cyber Security Forum Initiative

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

This report was prepared by The Institute for National Security Studies(INSS) and The Cyber Security Forum Initiative(CSFI) to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security worldwide in the domains of cyberspace and open source intelligence.

- Read Full Article - 0 Comments

Security Benchmarking and the Gift that will Keep on Giving

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

The Center for Cyber Security, Information Privacy and Trust at Penn State’s College of Information Sciences and Technology (IST) was recently the beneficiary of a unique gift: A cloud-based risk and analytics security platform called Benchmark, which is comprised of technology valued at $11.75 million.

- Read Full Article - 0 Comments

Cloud Security Alliance Announces Update for Software Defined Perimeter

Posted By - DynamicCISO,

The Cloud Security Alliance (CSA) last week announced the release of two key documents related to its Software Defined Perimeter (SDP), an initiative to create the next generation network security architecture.

- Read Full Article - 0 Comments

69% of Targeted Attacks in India Focus on Large Enterprises

Posted By - DynamicCISO,

Symantec Corp.’s recently released Internet Security Threat Report (ISTR), Volume 19, shows that attackers are unrelenting in their focus on large enterprises with over 69 percent or more than 2/3rd of the targeted attacks in India carried out on them.

- Read Full Article - 0 Comments

Step by Step Guide to Application Security Penetration Testing

Posted By - DynamicCISO,

This document will guide you to penetrate web applications step by step. The objective of this article is to help the Security Analyst/Penetration Testers/Developers/Ethical Hackers to follow a step by step penetration testing process, discover the vulnerability, and exploit and mitigate the same.

- Read Full Article - 0 Comments

Vishing Campaign Steals Card Data of Customers from Dozens of Banks in US

Posted By - DynamicCISO,

Multiple recent vishing attacks (Voice over IP phishing) have been stealing payment card data from the customers of U.S. banks. In an attack last week, customers of a midsize bank received SMS text messages claiming their debit card was deactivated and requesting they provide the card and PIN numbers to reactivate it.

- Read Full Article - 0 Comments

Governments Urge Users to Stay Away from IE Until it Gets Fixes

Posted By - DynamicCISO,

Numerous government security response teams across continents are urging Internet Explorer users to consider other web browsers like Chrome or Firefox as options until Microsoft delivers a security patch and fixes the bugs affecting all versions of its popular browser.

- Read Full Article - 0 Comments

Datacenter Security Buyers in North America May Switch Vendors for High Performance

Posted By - DynamicCISO,

Market research firm Infonetics Research released excerpts from its 2014 Datacenter Security Strategies and Vendor Leadership: North American Enterprise Survey, which details enterprises’ plans for deploying security solutions in datacenters, as well as their thoughts on leading datacenter security vendors.

- Read Full Article - 0 Comments

Heartbleed Vulnerability - The Most Secure Approach to Passwords

Posted By - DynamicCISO,

The discovery and fallout of the Heartbleed vulnerability has everyone scrambling to change the passwords to a myriad of online services. While this rush to change passwords has many wondering whether users will be able to remember all of their new passwords, others are concerned that changing passwords too fast will cause more problems.

- Read Full Article - 0 Comments

New Zero-day Vulnerability Found in Most IE Versions

Posted By - DynamicCISO,

A new zero-day vulnerability has been found in almost all versions of Microsoft's Internet Explorer (IE) browser. This was also confirmed by Microsoft confirmed on Saturday of last week. The vulnerability allows remote code execution and can be used in "limited, targeted attacks," says an advisory issued by Microsoft.

- Read Full Article - 0 Comments

David & Goliath – Winning Strategies in Cyber Warfare

Posted By - Calum MacLeod, Business Development Head

Today we live in a world where the “giants” are lined up against us. Cyber Crime, Sabotage and Espionage are daily facts of life. Whether we’re talking about botnets, defacing of web sites, spear-phishing - everyone seems to be defenseless against the relentless attacks that are targeting from your Facebook page to the SCADA syst

- Read Full Article - 0 Comments

Bad Bot % of Web Traffic Doubled in 2013: Distil Networks Report

Posted By - DynamicCISO,

New research released by Distil Networks - the leading public and private cloud security provider that blocks malicious bots, or automated computer programs, attacking your website- has found the majority of malicious bot traffic last year emanated from the USA and circulated the Web the most when maximum IT workers were not at work.

- Read Full Article - 0 Comments

Tech Giants Unite to Fund Core Infrastructure Initiative

Posted By - DynamicCISO,

In the aftermath of Heartbleed, Google, Facebook, Microsoft and other tech giants have joined hands to collectively fund open-source initiatives including OpenSSL to give the projects a much-needed resource boost to keep up with the complexity involved in today’s coding.

- Read Full Article - 0 Comments

The Enterprise Network: Effective Protection Strategies

Posted By - John Grady , Senior Manager of Product Marketing

Enterprise networks are at risk. According to an interagency document prepared by the National Institute of Standards and Technology (NIST), “security vulnerabilities are rampant,” and the CERT division of Carnegie Mellon University reports approximately one hundred new vulnerabilities each week. How can companies protect their networks

- Read Full Article - 0 Comments

Apache Warns of Faulty Zero Day Patch for Struts

Posted By - Michael Mimoso, Editorial Director for the TechTarget Security Media Group

The Apache Software Foundation today released an advisory warning that a patch issued in March for a zero-day vulnerability in Apache Struts did not fully patch the bug in question. Officials said a new patch is in development and will be released likely within the next 72 hours, said Rene Gielen of the Apache Struts team.

- Read Full Article - 0 Comments

Phishing Bloom in China Bucks Global Trends

Posted By - John Hawes, Chief of Operations

There's been a sharp upturn in the numbers of phishing pages, with the majority of them hosted in China and targeting Chinese victims and sites. That's according to analysis of world phishing trends from the Anti-Phishing Working Group (APWG).

- Read Full Article - 0 Comments

Heartbleed FAQs

Posted By - Richard Henderson, Security Strategist FortiGuard Labs

Heartbleed bug took the world by a storm. It is an unprecedented incident that has caught the global information security community totally unawares. What is it? How does it work? What it does? All the reasonable questions need answers. Here's an FAQ for your ready reference.

- Read Full Article - 0 Comments

Heartbleed

Posted By - Bruce Schneier, CTO

The Heartbleed bug allows to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All