Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Juniper Enhances Next-gen Firewall Capabilities to Improve Security at Enterprise Edge

Posted By - DynamicCISO,

Juniper Networks has announced powerful new capabilities in its Next-Generation Firewall (NGFW) solutions for protecting the enterprise edge, offering added security, control and efficiency while being easier to deploy and manage.

- Read Full Article - 0 Comments

Use the Force Luuuk

Posted By - DynamicCISO,

Stealing more than half a million euro in just a week – it sounds like a Hollywood heist movie. But the organizers of the Luuuk banking fraud pulled it off with a Man-in-the-Browser (MITB) campaign against a specific European bank.

- Read Full Article - 0 Comments

Mobile Messaging Security Gateways and Gi/SGi Firewalls Set for Spectacular Growth

Posted By - ,

Market research firm Infonetics Research released excerpts from its 2014 Mobile Infrastructure Security market size and forecasts report, which tracks short message service (SMS) and multimedia messaging service (MMS) security gateways and Gi/SGi firewalls.

- Read Full Article - 0 Comments

NSFOCUS Releases NTP Amplification Threat Update

Posted By - DynamicCISO,

NSFOCUS Technologies a provider of DDoS mitigation solutions and services, revealed a significant decrease in vulnerable Network Time Protocol (NTP) servers; however, there are still more than 17,000 NTP servers worldwide that run the risk of amplified DDoS attacks.

- Read Full Article - 0 Comments

McAfee Labs Report Sees Mobile Malware Abuse Trust in Early 2014

Posted By - DynamicCISO,

McAfee Labs has released the McAfee Labs Threats Report: June 2014, revealing mobile malware tactics that abuse the popularity, features, and vulnerabilities of legitimate apps and services, including malware-infested clones masquerading as the popular mobile game Flappy Birds.

- Read Full Article - 0 Comments

Why Senior Leaders are the Front Line Against Cyberattacks

Posted By - DynamicCISO,

All companies are aware of the growing risk of cyberattacks, yet few are taking the steps necessary to protect critical information. The key? Senior managers need to lead.

- Read Full Article - 0 Comments

Fortinet Reveals "Internet of Things: Connected Home" Survey Results

Posted By - DynamicCISO,

Fortinet yesterday released the results of a global survey that probes home owners about key issues pertaining to the Internet of Things (IoT). It gives a global perspective about the Internet of Things, what security and privacy issues are in play, and what home owners are willing to do to enable it.

- Read Full Article - 0 Comments

RSA – Malware Proposal on the Open Web Increasingly Fearless

Posted By - DynamicCISO,

RSA Research has recently published an interesting update on the underground sale of malware tool, the experts have discovered a server who is offering a set of spyware tools for sale under the vendor names TampStore and Crown Softwares.

- Read Full Article - 0 Comments

Now Free NaMo Anti Virus to Protect PCs

Posted By - DynamicCISO,

An Indian IT company, based in New Delhi, Innovazion has named its new antivirus software after India's PM 'NaMo' and has promised to provide free protection to PC users against malware and virus attacks.

- Read Full Article - 0 Comments

Beware Of E-commerce Fraud And Evolving Threats

Posted By - Tom Polsdorf, IT Manager, Edgewave

Online shopping and e-commerce fraud security risks are on the rise. Read any news source and you will see references to the latest, weekly attacks against all types of organizations – retail, financial, healthcare, government, commercial – the list continues to grow every day.

- Read Full Article - 0 Comments

Security Risks from Remote-Controlled Smart Devices

Posted By - Bruce Schneier, CTO

We're starting to see a proliferation of smart devices that can be controlled from your phone. The security risk is, of course, that anyone can control them from their phones. Because these devices send to have their code in firmware, a lot of them won't be patchable.

- Read Full Article - 0 Comments

US House of Reps Passes Law to Curb NSA's Electronic Surveillance Powers

Posted By - DynamicCISO,

The US House of Representatives approved a bill that would restrict the electronic surveillance powers of the National Security Agency (NSA). The margin was wide, 293 to 123, for the bill attached to the defence budget for 2015, which begins October 1.

- Read Full Article - 0 Comments

Hackers Exploit Cryptolocker Hysteria

Posted By - Alex Balan , Head of Product Management, BullGuard,

Hackers have launched a massive phishing campaign to exploit the fear generated by the Cryptolocker ransomware. A spam email campaign, discovered by BullGuard, has just been detected that offers decryption keys for Cryptolocker.

- Read Full Article - 0 Comments

Security is a Full-time Job

Posted By - Dale Rapp, Network Support, Project Management, and IT Security Expert

With all the recent security breaches making the news, it has squarely focused every ones attention on security. Most of these breaches are out of the end users control and the outcome is usually resetting passwords, selecting new pin numbers, or being issued new credit cards or debit cards.

- Read Full Article - 0 Comments

Often Made Mistakes in Fraud Prevention Programs

Posted By - Bryan Jardine, Project Manager, Easy Solutions

Over the last decade, I have spent the majority of my time focused on strategic planning for fraud prevention and fraud program enhancements. have taken the time to identify the most reoccurring themes I have seen throughout my travels and wanted to share them with you.

- Read Full Article - 0 Comments

Trend Micro Offers Advanced Security Solution for VMware vCloud Hybrid Service

Posted By - DynamicCISO,

Trend Micro has announced a solution for VMware's vCloud Hybrid Service, which enables customers to seamlessly move their on-premise or private cloud deployment to the public cloud. Trend Micro Deep Security solution features a comprehensive platform for security controls and policies.

- Read Full Article - 0 Comments

Hackers Demand Ransom From Dominos Pizza to Return Stolen Data

Posted By - DynamicCISO,

A hacking group has struck Domino's Pizza and is demanding ransom to return more than 650,000 passwords stolen from its customers based in France and Belgium. Rex Mundi had reportedly demanded €30,000 (£23,890) from the company.

- Read Full Article - 0 Comments

Why SaaS is the Best Option in the Security Software Market?

Posted By - Amit Nath, Country Manager, F-Secure

In today's world, Security as a Service (SaaS) makes good business sense. By leaving security to the professionals, businesses can focus time and resources on their commercial priorities. With SaaS, businesses get cost-effective protection provided by dedicated experts and world class technology.

- Read Full Article - 0 Comments

Secrets Of Data Loss: What The Professionals Won’t Tell You (Infograph)

Posted By - DynamicCISO,

Did you know that 60% of companies that suffer a data loss will shut down within 6 months following the incident? iSkySoft has just released an infographic that examines the impact and causes of data loss, as well as tips on recovering data and loss prevention.

- Read Full Article - 0 Comments

How To Make Security Awareness Part Of Your Work Culture

Posted By - Sara Gates, Founder and CEO, Wisegate

Research from Wisegate’s latest report, Security Awareness Programs: CISOs Share Practical, Simple Strategies, shows that most CISOs identity the user as the most commonly exploited security vulnerability, and for good reasons.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All