Application security, Security
March 8, 2023
Via: Help Net SecurityAfter combing through 350,000 reports to find 650 API-specific vulnerabilities from 337 different vendors and tracking 115 published exploits impacting these vulnerabilities, the results clearly illustrate that the API threat landscape is becoming more dangerous, according to Wallarm. Researchers came […]
December 6, 2022
Via: SecurelistThere are two main types of online fraud aimed at stealing user data and money: phishing and scams. Phishers primarily seek to extract confidential information from victims, such as credentials or bank card details, while scammers deploy social engineering to […]
Threats & Malware, Virus & Malware
September 20, 2021
Via: Help Net SecurityOver a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the majority of organizations […]
January 6, 2021
Via: CIOWe enter 2021 in a very different place from where we were at the start of 2020. The role of networking and more broadly, the IT function, has more often become the hero – and sometimes the scorn – of […]
December 30, 2019
Via: Help Net SecurityIt’s almost 2020, which means teams are finalizing cyber budgets, strategies and goals. However, as you’re preparing for the new year, it’s important to keep an eye out for how the cybersecurity landscape might shift in 2020. From the rise […]
November 29, 2018
Via: Help Net SecurityEnabling the business outcome in a ‘Real-Time’ enterprise environment is the next challenge for global brands and government agencies in 2019. Tech companies will need to drive hard to continually exceed to their customers’ expectations during a time of accelerating […]
November 16, 2018
Via: Security IntelligenceThe General Data Protection Regulation (GDPR) has been a game changer for data privacy, and U.S. companies are beginning to catch up to the EU in data management practices. However, privacy is only one area in which U.S. organizations are […]
November 2, 2018
Via: Help Net SecurityIn an attempt to make industrial control systems less accessible to attackers, industrial players are limiting network access and increasingly using USB media devices to transfer patches, updates and files to those systems. But that choice is not devoid of […]
May 11, 2018
Via: CSO OnlineEndpoint security is in many ways the direct descendent of the first forms of computer protection in the earliest days of IT. But it’s a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones […]
January 22, 2018
Via: Zone AlarmOn the surface, cyberattacks to unprotected home users may not appear to be lucrative for hackers, especially if you are only looking at a single instance. Attackers targeting individuals tend to keep their ransom relatively low (if compared to companies,) […]
February 21, 2017
Via: We Live Security2016 brought some interesting developments to the Android ransomware scene, seeing ransomware emerge as one of the most pressing cybersecurity issues on the mobile platform. Authors of lock-screen ransomware, as well as file-encrypting “crypto-ransomware”, used copycat techniques proven effective in […]
January 18, 2017
Via: InfoWorldOne of the toughest parts of being a computer security pro is trying to figure out what to hang your career on every two to five years. Which new buzzwords will stick to become a new paradigms, and which will […]
January 9, 2017
Via: Computer WeeklyRansomware or malware that locks up data and demands payment for its release is set to evolve and make up the majority of cyber attacks in 2017, according to most predictions by security commentators. Cyber attacks that exploit weaknesses in […]
December 15, 2016
Via: TrendMicro BlogIn our 2017 Predictions report, “The Next Tier: 8 Security Predictions for 2017” we state that ransomware growth will plateau in 2017, but attack methods and targets will diversify. Let’s explore what we mean by this and how this threat […]
November 4, 2016
Via: Dark ReadingWhen it comes to picking the top skills needed to fill the massive number of open positions in the information security industry, Wils Bell, security recruiter at SecurityHeadhunter.com, says: “All cybersecurity appears hot, and no one area is hotter than […]
October 26, 2016
Via: Help Net SecurityThe top five emerging trends driving the global IT consulting services according to Technavio are: Adoption of environment-friendly technology Growing preference for remote working environments Increase in service offshoring Increase in market consolidation Rise in use of cloud-based IT infrastructure. […]
June 1, 2016
Via: Dark ReadingWhen it comes to IT security, the old saw says, the only constant is change. As Dark Reading looks back over the ten years since its launch in 2006, that maxim seems more accurate than ever. Like generals fighting a […]
March 30, 2016
Via: Security IntelligenceNow that we’re well into 2016, you likely have various information security initiatives underway. The specifics you’re working on are, no doubt, priorities given your unique needs, budget and so on. But are you focusing on the right things? Are […]
March 10, 2016
Via: Security WeekThe RSA Conference in San Francisco is the largest annual gathering of people working in, selling to, reporting on or analyzing the security industry. Each year there are general trends that come out of the show, although trends can be […]
January 20, 2016
Via: Tech RepublicOn Tuesday, January 19, Cisco released its 2016 Annual Security Report, highlighting the progression of cybersecurity and what businesses can expect as they move more into the new year. The full report (with appendix) is 87 pages long, so we’ll […]