Latest Posts

Adc7bc93d49867e98bdd5ec1617f4e32

Steam Patches Crypto Code to Prevent Padding Oracle Attacks

May 03, 2016 Added by:Ionut Arghire

Steam recently patched security vulnerabilities in its system to prevent attackers from tapping into the data transmitted between a local client and the Steam network to view plain-text passwords or take over accounts.

Comments  (0)

37b77b2d6c99c432123b1b46fa64e566

The Role of CASBs in Protection Against the 2016 “Treacherous 12"

May 03, 2016 Added by:Ganesh Kirti

We looked at how well CASBs would fare in helping enterprises survive the treacherous 12 and guess what? CASBs clearly address nine of the treacherous 12 (along with many other risks not mentioned in the report).

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

866acb3cb223a9bbf8171ffc9dee19ae

Bangladesh Bank: Why Aren't We Talking About Privileged Account Management?

April 26, 2016 Added by:Jim Legg

While prevention of the initial breach is an important layer of an enterprise security strategy, perimeter-based threat protection alone is not sufficient to protect against today’s increasingly sophisticated and targeted external security threats.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

End-to-end Encryption, Today -- Loophole Closed or Moved?

April 22, 2016 Added by:Vanishree Rao

End-to-end encryption does not solve the problem, despite the common perception that it is the holy grail of instant-messaging security. It is necessary that service providers shift their attention toward non-traditional key-derivation mechanisms to close the loophole.

Comments  (0)

41d5440f596e714d7ca33eccabc5fcab

Access Management Increases Security, Cuts Costs

April 22, 2016 Added by:Dean Wiech

While IT spending may be cut back, investments in identity and access management (IAM) solutions continue to grow because of security issues, flexibility and an overall cost savings.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

Nuclear Exploit Kit Targets Non-English Users in Over 150 Countries

April 21, 2016 Added by:Ionut Arghire

Researchers at Cisco Talos have recently had a closer look at Nuclear and noticed that its operators have switched focus toward non-English users, but that they are targeting people in more than 10,000 different cities in over 150 countries worldwide.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

5af5a92f9548968dc33daa522c823aa1

3 Requirements for Effective Security Investigations

April 15, 2016 Added by:Tomer Saban

In order to provide security teams with the ability to react quickly and accurately to cyber-attacks and overcome technical and resource-related limitations, here are three fundamental requirements to consider.

Comments  (0)

Adc7bc93d49867e98bdd5ec1617f4e32

RockLoader Dropper Downloads Locky, Kegotip, and Pony

April 14, 2016 Added by:Ionut Arghire

A new malware downloader has been spotted recently, used to drop various malicious programs to compromised computers, including the Locky ransomware and the Kegotip and Pony info stealers.

Comments  (0)