Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

AT&T Hacker Demanding Millions from the Government

Posted By - Rahul Neel Mani, Editor

Andrew 'weev' Auernheimer, who have provoked the US authorities to reform the Computer Fraud and Abuse Act (CFAA), wants the US Government to pay him $13 million for taking away his freedom for the past three years.

- Read Full Article - 0 Comments

CyberArk Simplifies Meeting PCI DSS 3.0 Compliance to Protect ‘Keys to IT Kingdom’

Posted By - DynamicCISO,

In the face of increasing cyber-attacks on the retail industry, CyberArk has released a white paper demonstrating how retailers can comply with the latest Payment Card Industry Data Security Standard (PCI DSS) regulations.

- Read Full Article - 0 Comments

Check Point's Revolutionary Cyber Intelligence Initiative: ThreatCloud IntelliStore

Posted By - DynamicCISO,

CheckPoint has announced the launch and immediate availability of ThreatCloud IntelliStore - a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks.

- Read Full Article - 0 Comments

100 Hackers Arrested by FBI over Blackshades Malware in a Global Raid

Posted By - DynamicCISO,

In nearly a dozen raids across the world in an action prompted by the US FBI, the police have been able to detain over 100 hackers behind 'RAT' software, which lets attackers take over Facebook accounts and infect their the PCs.

- Read Full Article - 0 Comments

U.S. Charges Five Chinese Military Hackers for Cyber Espionage

Posted By - DynamicCISO,

A grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries.

- Read Full Article - 0 Comments

Six Smartphone Security Mistakes Place Users At Risk

Posted By - Davis Joseph , Online Marketing Manager

Smartphones have revolutionized our lives. However, the growth of this technology has also brought privacy and security concerns. Whether it is a matter of personal data or the data of organizations, users need to be aware about how to optimize their use of smartphones. This includes avoid making some common mistakes while using one’s device.

- Read Full Article - 0 Comments

Police Website of City of Rawalpindi in Pakistan Hacked

Posted By - DynamicCISO,

Hackers took the website of Rawalpindi City police in Pakistan for a ride and hacked it. According to police officials, no sensitive data has been compromised so far.

- Read Full Article - 0 Comments

Trend Micro’s Q1 Security Roundup: Cybercriminal’s Advanced Methods for Executing Attacks on Wide Variety of Targets

Posted By - DynamicCISO,

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft as revealed in Trend Micro's first quarter security roundup for 2014, “Cybercrime Hits the Unexpected." Greed is motivating cybercriminals to take a non-traditional approach in the selection of unlikely targets.

- Read Full Article - 0 Comments

Google Fixes Three Major Flaws in Chrome

Posted By - DynamicCISO,

Google has patched three key security vulnerabilities in its browser Google Chrome in the new version which was released on Tuesday this week.

- Read Full Article - 0 Comments

Too Many Threats, Too Few Professionals

Posted By - Jason Waterman, Principcal Consultant

According to the Cisco Annual Security Report 2014, there are approximately one million unfilled Security jobs worldwide. The supposed ‘war on talent’ is nothing new, but to a lot of people data breaches and information security flaws are featuring in the mainstream news streams for the first time.

- Read Full Article - 0 Comments

Average Enterprise Generates 10,000 Security Events Per Day

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

According to findings in Damballa’s Q1 2014 State of Infections Report, average enterprise generates as many 10,000 security events per day, many of which require manual analysis to determine if there are early indicators of a compromise of systems.

- Read Full Article - 0 Comments

SanDisk Introduces Security-Certified Self-Encrypting Solid State Drive for Corporate Environments

Posted By - DynamicCISO,

SanDisk Corporation has announced its first, self-encrypting solid state drive (SSD) — the SanDisk X300s SSD. The new X300s SSD delivers maximum data protection and performance to help address IT decision makers’ top data management and security challenges.

- Read Full Article - 0 Comments

Internet Subversion

Posted By - Bruce Schneier, CTO

In addition to turning the Internet into a worldwide surveillance platform, the NSA has surreptitiously weakened the products, protocols, and standards we all use to protect ourselves. By doing so, it has destroyed the trust that underlies the Internet. We need that trust back.

- Read Full Article - 0 Comments

Huge Number of Servers and Websites Still Vulnerable to Heartbleed

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

Surveys by security researchers has revealed that around 300,000 servers and more than 30,000 websites are still vulnerable to the Heartbleed bug that affects certain versions of OpenSSL.

- Read Full Article - 0 Comments

Britain's ICO Reveals Top Data Security Threats in Report

Posted By - DynamicCISO,

The British Information Commissioner’s Office (ICO) has published a new security report highlighting eight of the most common IT security vulnerabilities that have resulted in organisations failing to keep people’s information secure.

- Read Full Article - 0 Comments

Splunk Strengthens Operational Intelligence: Launches Splunk Enterprise 6.1

Posted By - DynamicCISO,

Splunk Inc. the maker of a leading software platform for real-time Operational Intelligence, has announced the availability of Splunk Enterprise 6.1, its latest version of platform for machine data available as software or as a cloud service.

- Read Full Article - 0 Comments

Twitter Implements System that Identifies Suspicious Login Behaviour

Posted By - DynamicCISO,

Seeking to better protect user accounts, Twitter has implemented a system that identifies suspicious login behavior by analyzing location data, the device being used and login history, according to a Thursday post by Mollie Vandor, product manager with Twitter.

- Read Full Article - 0 Comments

Bit.ly Warns Security Attack: Account Security Could be Compromised

Posted By - DynamicCISO,

Bit.ly, world's most used URL shortening website, has issued a security warning on its official blog which says that it suspects users’ account credentials could have been compromised.

- Read Full Article - 0 Comments

Stopping Social Engineers In Their Tracks: Part 2

Posted By - Valerie Thomas , Senior Information Security Consultant

Social engineering attacks can’t be stopped with technology alone; nor can they be stopped with training alone. I created the Social Engineering Defensive Framework (SEDF) to help organizations prevent social engineering attacks at the enterprise level. SEDF outlines basic phases for attack prevention.

- Read Full Article - 0 Comments

Stopping Social Engineers In Their Tracks: Part 1

Posted By - Valerie Thomas , Senior Information Security Consultant

The simple truth is social engineering attacks can’t be stopped with technology alone; nor can they can’t be stopped with training alone. I created the Social Engineering Defensive Framework (SEDF) to help organizations prevent social engineering attacks at the enterprise level. SEDF outlines basic phases for attack prevention.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All