September 9, 2021
Via: Security WeekTwo decades ago, the U.S. and its allies invaded Afghanistan as retribution for the 9/11 terrorist attacks carried out by the al-Qaeda terror group. The Taliban, who had harbored al-Qaeda in Afghanistan, was forced out of government. Now, 20 years […]
March 10, 2019
Via: James HughesMobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. […]
Network security, Threats & Malware
December 13, 2018
Via: Dark ReadingMcAfee finds malware associated with ‘Operation Sharpshooter’ on systems belonging to at least 87 organizations. A cyberthreat group using malware tied to the Sony Pictures hack of late 2014 is attacking nuclear, defense, energy, and financial companies in what appears […]
Mobile security, Network security
May 18, 2018
Via: The HillLawmakers are trying to use the must-pass National Defense Authorization Act (NDAA) to take a hard-line stance against Chinese technology in U.S. markets. On Thursday, several lawmakers attempted to insert amendments into the fiscal 2018 NDAA aimed at keeping products […]
May 17, 2018
Via: Security IntelligenceThe cybersecurity industry today remains fragmented, with some organizations having as many as 85 security tools from 45 different vendors. Many of these technologies have been acquired over multiple years to address specific challenges across the complex threat landscape. Each […]
April 13, 2018
Via: The HillCybersecurity experts say defense contractors are facing more aggressive attacks as nation states and other hacking groups increasingly use malicious software to block information or manipulate data. The companies that provide U.S. military and intelligence agencies with products and services […]
November 27, 2017
Via: Security IntelligenceWith the IoT market on track to reach $800 billion this year and more than 2 billion connected devices already in the wild, it’s no surprise that Internet of Things (IoT) security is now a top priority for cutting-edge enterprises. […]
October 6, 2017
Via: Security WeekA group of security researchers has discovered a new type of attack that can exploit the Rowhammer vulnerability in DRAM chips that was uncovered several years ago, effectively bypassing existing defenses. In a newly published paper (PDF), eight researchers from […]
December 23, 2016
Via: Security WeekSevere non-malware attacks and ransomware are the two stand-out malicious behaviors of 2016. When combined, as they have been with the PowerWare extortion, the attack can be both dangerous and difficult to detect. Carbon Black analyzed data from more than […]
October 28, 2016
Via: The HillNuclear power plants, chemical plants, defense contractors and other highly sensitive industries and workers are leaking information through their pagers, a new report shows. Pagers have been out of vogue with the public since the rise of the cellphone but are […]
October 26, 2016
Via: Help Net SecurityThe top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote working environments Increase in service offshoring Increase in market consolidation Rise in use of cloud-based IT infrastructure. […]
October 13, 2016
Via: InfoWorldBad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on an analysis of nearly 4 million breach methods. Security professionals are figuring out how to […]
August 10, 2016
Via: The HillSen. Tom Carper (D-Del), the ranking member of the Senate Homeland Security Committee, is pushing the Department of Homeland Security to reclassify elections as critical infrastructure. In a letter sent Monday to DHS Secretary Jeh Johnson, Carper writes “Designating election […]
August 4, 2016
Via: Help Net SecurityCyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common infection, encryption and removal characteristics, and identify potential strategies for mitigating the impact of ransomware […]
May 20, 2016
Via: TrendMicro BlogRansomware is fast becoming the scourge of IT departments all over the world. It has risen over the past 12-24 months from a minor nuisance to a major threat – causing business disruption and damaging the brand and reputation of […]
May 18, 2016
Via: Kaspersky BlogIf you are aware of what ATM skimmers are — and in if you’re not, you should read this post first — you probably know how to act in order to keep your bank card safe. You need to watch […]
April 21, 2016
Via: Help Net SecurityAs long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In simplistic terms, a malware’s arrival on an endpoint takes a significant journey and trades […]
April 14, 2016
Via: Zone AlarmRansomware started out as little more than an obnoxious practical joke, created by the not-so-stable biology professor Dr. Joseph Popp in 1989, when he distributed diskettes that supposedly contained Aids education software, but in fact contained a virus that locked […]
March 11, 2016
Via: Security IntelligenceInformation technology, and especially information security, is a quickly evolving playing field. Those working in incident handling and incident response always need to stay on top of what’s new and what is trending in their area of expertise. By attending […]
February 11, 2016
Via: Tech RepublicAs with anything techy, terms like “threat intelligence” have myriad definitions. For our purposes, let’s use Gartner’s description: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to […]