Latest Posts

3caea4d9bcdd5cde2b1a1f338a06a086

Traffic Intelligence: Open vs. Closed Crowd-Sourced

May 21, 2015 Added by:Jonathan Curtis

This comparison is quite analogous to the differences I’ve experienced between simple threat feeds and premium threat intelligence offerings. I’ll let you draw your own conclusion as to how.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

The Logjam Attack: What You Need to Know

May 21, 2015 Added by:Malwarebytes

A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed on the web.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Microsoft Patching: Don’t Forget to Read the Fine Print

May 21, 2015 Added by:Tripwire Inc

During my career, I have built and managed hundreds of production-level client and server systems, and nothing can be more worrisome than when it comes time to apply patches and upgrades to software. Why? Because things can, and often times, do go wrong during patch and upgrade cycles.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Shock Therapy for Medical Device Malware

May 20, 2015 Added by:Danny Lieberman

An enterprise hospital network is a dangerous place.

Comments  (0)

Af2c9843333cc1e2578ddf18b3eed066

Banking Customers Under Attack Beyond the Perimeter

May 20, 2015 Added by:Peter Zavlaris

The truth is with banking transactions now spreading out via websites and mobile apps, defense should not end at your firewall--instead you must consider every web asset, social media site or mobile app under your brand to be at risk of breaching customer trust.

Comments  (0)

0ead717779244d9aab5c1699308850d2

DDoS Attacks Spiked in Q1 2015: Akamai

May 20, 2015 Added by:Brian Prince

The first quarter of the year set a record for the number of DDoS attacks observed across Akamai's Prolexic network, with the total number of attacks being more than double the number recorded in the first quarter of 2014.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

FBI Says Researcher Admitted Hacking Airplane in Mid-Flight

May 19, 2015 Added by:Eduard Kovacs

A researcher who specializes in aircraft security admitted hacking into an airplane’s systems during a flight and successfully sending a climb command to one of the engines, according to an FBI search warrant application.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Top Three Attack Vectors for SAP Systems

May 19, 2015 Added by:Anthony M. Freed

A new study based on the assessment of hundreds of SAP implementations found that over 95% of SAP systems were exposed to vulnerabilities that could lead to full compromise of an organization’s critical data.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Highlights From Verizon Data Breach Report 2015

May 19, 2015 Added by:Anton Chuvakin

Credential abuse still reign supreme.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

It’s NOT the Technology Failing, It’s the Provisioning

May 18, 2015 Added by:Tripwire Inc

Over the last year or so, it has become increasingly obvious that there is a uniformity related to technology failures, and more than one would be expected to encounter.

Comments  (0)