Advertisement
Top

Tag: Cyber


Phishing

Five cyber risks that will define 2020

January 6, 2020

Via: Help Net Security

2019 was a bad year for data security. By virtually every metric, it was the worst ever. According to the Ponemon Institute’s 2019 Cost of a Data Breach Report, the average cost of a data breach reached $3.92 million, the […]


Network security

An intelligence-driven approach to cyber threats

June 6, 2019

Via: Help Net Security

In the age of big data, it is easy to think that only machines can detect a signal amid the noise. While it’s true that big data tools can discover signals that might not be obvious, they can also create […]


Network security

Cyber incidents are now a top risk for global businesses

February 8, 2019

Via: TechRadar

Dealing with risk is something businesses do every day and in today’s digital world IT outages can have severe consequences for companies of any size. To aid businesses in understanding the risks they face, global insurer Allianz releases a Risk […]


Network security

Dems want GOP chairman to subpoena State Department over cyber docs

August 10, 2018

Via: The Hill

Democrats on the House Oversight and Government Reform Committee are urging its Republican chairman to subpoena the State Department for documents related to former Secretary Rex Tillerson’s move to close an office responsible for advancing U.S. interests in cyberspace. The […]


Network security

GOP chair urges Senate to pass DHS cyber reorganization bill

August 9, 2018

Via: The Hill

House Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday again urged the Senate to pass legislation that would rename and reorganize the Department of Homeland Security’s cyber wing, citing compounding threats to U.S. interests in cyberspace. The legislation would […]


Hacker, Network security

Cyber report details tricks used by hackers to target critical infrastructure

August 8, 2018

Via: The Hill

A cybersecurity firm says it uncovered the methods and tools hackers use to target critical infrastructure organizations, activity it observed by creating a website that masqueraded as a major electricity provider. Cybereason on Monday released a report on its “Honeypot […]


Network security

Every Week Is Shark Week in Cyberspace

July 30, 2018

Via: Dark Reading

Your data, identities, and credentials are cyber chum. Here’s how to protect yourself from the feeding frenzy. Your odds of being attacked by a shark are zero if you never venture into the ocean — which is far lower than […]


Threats & Malware, Vulnerabilities

Intel: Massive cyber-vulnerability not limited to our chips

January 4, 2018

Via: The Hill

The massive cyber-vulnerability revealed this week in Intel’s chips goes beyond the firm and affects other companies’ chips as well, according to Intel. The chip flaw leaves many computer processors created over the last 10 years, according to some reports, open […]


Hacker, Network security

Hacking bitcoin and blockchain

December 12, 2017

Via: CSO Online

It is hard to turn on the television or read a tech blog without getting inundated with stories about bitcoin or blockchain. The biggest reason bitcoin is so popular is its nearly 2,000 percent increase in price over the last […]


Network security

State Dept insists cyber a priority despite office closure

December 5, 2017

Via: The Hill

A State Department official defended the decision to close an office dedicated to cyber diplomacy, saying it reflects an effort to integrate cyber and digital economy policymaking efforts. Secretary of State Rex Tillerson notified Congress in August of the department’s […]


Cloud security

Cloud-based solutions that protect against zero day attacks

June 4, 2015

Via: cloud-security

BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time.  The company is introducing a suite of security products designed to defend against targeted attacks, […]


Cyber-crime

Data Breach Costs Hit Record $3.8 Million Each, and Counting

June 3, 2015

Via: cyber-crime

The average cost for each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 in this year’s study. Some 47% of all breaches were caused by malicious or criminal attacks. Previously, these attacks […]


Vulnerabilities

Intelligent packet capture for increased network visibility

June 2, 2015

Via: vulnerabilities

Lancope is unveiling its new PacketWatch solution for intelligent packet capture this week at Infosecurity Europe 2015. With the PacketWatch solution, large enterprises can obtain deeper network visibility and more granular security context for streamlined incident response and forensics – […]


Cyber warfare

Complex security solutions are exposing companies to risk

May 28, 2015

Via: Cyber Warfare

Companies are putting their customers’ #data at #risk because IT teams do not have the expertise or time to deploy today’s complicated IT #security products, a new survey from Lieberman Software revealed. The survey, which was carried out at RSA […]


Cyber-crime

Sniffing and tracking wearable tech and smartphones

May 25, 2015

Via: cyber-crime

Researchers at Context Information #security have demonstrated how easy it is to monitor and record #bluetooth Low Energy signals transmitted by many #mobile phones, wearable devices and iBeacons, including the iPhone and leading fitness monitors, raising concerns about #privacy and […]


Cyber-crime

Top cyber attack vectors for critical SAP systems

May 6, 2015

Via: cyber-crime

SAP is run by over 250,000 customers worldwide, including 98 percent of the 100 most valued brands. Despite housing an organization’s most valuable and sensitive information, SAP systems are not protected from cyber threats by traditional security approaches. Based on […]


Cyber-crime

Cyber attacks aren`t just targeting big business

May 5, 2015

Via: cyber-crime

81% of small business owners believe cyber security is a concern for their business, with 94% stating they frequently or occasionally think about cyber security issues. The Endurance survey also found that 31% of small businesses have experienced a cyber-attack […]


Cyber-crime

Radware launches hybrid cloud based WAF service

April 21, 2015

Via: cyber-crime

#cyber attacks remain a persistent #threat and have become sophisticated in size and scope. DoS, SQL injections and cross-site scripting are the most common web #attack vectors, increasing in popularity. As migration to the #cloud continues and expands, companies today […]


Cyber-crime

Pawn Storm cyberspies still at work, target NATO and the White House

April 17, 2015

Via: cyber-crime

Pawn Storm, the long-standing economic and political #cyber–#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and Outlook accounts, the attackers send spear-phishing emails carrying malware and compromise websites to redirect […]


Threats & Malware

IBM opens up its threat data as part of new security intelligence sharing platform

April 16, 2015

Via: threats-and-malware

#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks […]