Member’s Login

Forgot Password  |  Create an account
Blogs

Blogs

 

Internet Subversion

Posted By - Bruce Schneier, CTO

In addition to turning the Internet into a worldwide surveillance platform, the NSA has surreptitiously weakened the products, protocols, and standards we all use to protect ourselves. By doing so, it has destroyed the trust that underlies the Internet. We need that trust back.

- Read Full Article - 0 Comments

Huge Number of Servers and Websites Still Vulnerable to Heartbleed

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

Surveys by security researchers has revealed that around 300,000 servers and more than 30,000 websites are still vulnerable to the Heartbleed bug that affects certain versions of OpenSSL.

- Read Full Article - 0 Comments

Britain's ICO Reveals Top Data Security Threats in Report

Posted By - DynamicCISO,

The British Information Commissioner’s Office (ICO) has published a new security report highlighting eight of the most common IT security vulnerabilities that have resulted in organisations failing to keep people’s information secure.

- Read Full Article - 0 Comments

Splunk Strengthens Operational Intelligence: Launches Splunk Enterprise 6.1

Posted By - DynamicCISO,

Splunk Inc. the maker of a leading software platform for real-time Operational Intelligence, has announced the availability of Splunk Enterprise 6.1, its latest version of platform for machine data available as software or as a cloud service.

- Read Full Article - 0 Comments

Twitter Implements System that Identifies Suspicious Login Behaviour

Posted By - DynamicCISO,

Seeking to better protect user accounts, Twitter has implemented a system that identifies suspicious login behavior by analyzing location data, the device being used and login history, according to a Thursday post by Mollie Vandor, product manager with Twitter.

- Read Full Article - 0 Comments

Bit.ly Warns Security Attack: Account Security Could be Compromised

Posted By - DynamicCISO,

Bit.ly, world's most used URL shortening website, has issued a security warning on its official blog which says that it suspects users’ account credentials could have been compromised.

- Read Full Article - 0 Comments

Stopping Social Engineers In Their Tracks: Part 2

Posted By - Valerie Thomas , Senior Information Security Consultant

Social engineering attacks can’t be stopped with technology alone; nor can they be stopped with training alone. I created the Social Engineering Defensive Framework (SEDF) to help organizations prevent social engineering attacks at the enterprise level. SEDF outlines basic phases for attack prevention.

- Read Full Article - 0 Comments

Stopping Social Engineers In Their Tracks: Part 1

Posted By - Valerie Thomas , Senior Information Security Consultant

The simple truth is social engineering attacks can’t be stopped with technology alone; nor can they can’t be stopped with training alone. I created the Social Engineering Defensive Framework (SEDF) to help organizations prevent social engineering attacks at the enterprise level. SEDF outlines basic phases for attack prevention.

- Read Full Article - 0 Comments

Sophisticated Viknok Malware Proves That Click-fraud Is Still a Moneymaker for Scammers

Posted By - DynamicCISO,

Symantec, the security solutions major, has spotted a recent surge of infections of Trojan.Viknok, which can gain elevated operating system privileges in order to add compromised computers to a botnet. Trojan.Viknok, first observed in April 2013, infects dll files with a malicious payload.

- Read Full Article - 0 Comments

Microsoft Releases Security Intelligence Report: Malware Remains the Biggest Minace

Posted By - DynamicCISO,

In the latest Microsoft’s biannual Security Intelligence Report (SIR) the company has revealed that malware infections are the biggest threat and it has almost tripled in Microsoft Windows in 2013.

- Read Full Article - 0 Comments

HP Launches Helion Cloud: Boasts Control of Cloud Data and Security

Posted By - DynamicCISO,

HP has introduced HP Helion, a portfolio of cloud products and services that enable organizations to build, manage and consume workloads in hybrid IT environments. Helion will also provide enterprises control of cloud data and security and it includes open source OpenStack technology.

- Read Full Article - 0 Comments

Researchers Release Twitter Bot Detection Tool

Posted By - Anthony M Freed, Senior Editor of Publications for Norse Corporation

Researchers at Indiana University’s Bloomington School of Informatics and Computing have released a tool designed to detect if a Twitter account is being operated by an automated “bot” system or a real person.

- Read Full Article - 0 Comments

New Ransomware Spreads to Android Devices: Holds Phones Ransome for Viewing Illegal Porn

Posted By - DynamicCISO,

A new Android malware has been discovered by researchers that disables the handheld devices until the end users pay the ransom. This ransomware is similar to CryptoLocker that targets computers running Microsoft Windows and was discovered during Sept 2013.

- Read Full Article - 0 Comments

NSA-Google Email Exchanges Leaked by Al Jazeera

Posted By - DynamicCISO,

Media Broadcasting Company Al Jazeera has recently leaked email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt which suggest a different and tacit working relationship between technology company and the US Government.

- Read Full Article - 0 Comments

French Telecom Major Orange Hacked Again: Over 1M Users Hit

Posted By - DynamicCISO,

While the dust of Target Data Breach hasn't settled yet, another bizzare case has come to the fore. This time its from the Europe where personal data of nearly 1.3 million customers of Orange - the French Telecom Operator - have been reportedly stolen.

- Read Full Article - 0 Comments

Target Data Breach Case: The Return on Security Investment (ROSI)

Posted By - Rahul Neel Mani, Editor

With the Target CEO losing his job over the Dec 2013 Data Breach case, the debate on Return on Security Investment (RoSI) returns back. The breach was a blunder of sorts. It allowed 40 million credit and debit cards details to be stolen between Nov 27 and Dec. 15, 2013.

- Read Full Article - 0 Comments

The Non-Advanced Persistent Threat

Posted By - Barry Chteiman, ‎Director Security Strategy

Today, we are releasing our latest instalment in the Hacker Intelligence Initiative (HII) report series, and our focus this time is on insider threats. Specifically, our focus is on the causes for data exfiltration from an organization.

- Read Full Article - 0 Comments

FireEye to Acquire nPulse Technologies

Posted By - DynamicCISO,

FireEye has announced to acquire privately held nPulse Technologies, the performance leader in network forensics. The combination of the nPulse network forensics solution with the FireEye Security Platform will deliver the industry’s only Enterprise Forensics solution for visibility into the entire attack life cycle.

- Read Full Article - 0 Comments

IBM Ups its Stakes in InfoSec Game: Introduces Comprehensive Threat and Data Protection Services

Posted By - DynamicCISO,

IBM has introduced comprehensive new security security software and services to help organizations protect their critical data in an environment where advanced persistent threats, zero day attacks, breaches and the financial impact on an organization continue to rise.

- Read Full Article - 0 Comments

Facebook to Let Users Log into Third-party Apps Anonymously

Posted By - DynamicCISO,

Facebook has introduced Anonymous Login for third-party apps. With Anonymous Login, users can login to new apps without having to create a new account. The feature which is available on both web and mobile is specially for those users who are not comfortable to sign in by providing real information.

- Read Full Article - 0 Comments

Subscribe to our newsletter for all the latest updates and special offers.

Click Here To view archive additions

Older Entries

Monday, April 14th, 2014 02:55:00 PM Heartbleed - Bruce Schneier, CTO
Sunday, April 27th, 2014 09:10:00 AM Heartbleed FAQs - Richard Henderson, Security Strategist FortiGuard Labs
View All