October 21, 2014 Added by:Patrick Oliver Graf
Going forward, we have to be prepared for the possibility that private information provided to a third party, like a merchant or a public agency, will be stolen.
October 17, 2014 Added by:InfosecIsland News
On Monday, October 20, 2014, attendees from around the world will gather in Atlanta, Georgia for the 2014 Industrial Control Systems (ICS) Cyber Security Conference.
October 17, 2014 Added by:Joe Weiss
Bob Radvanovsky from Infracritical took a similar approach and the results are astounding. He acquired some Ruggedom switches from E-Bay and set up a network emulating a well pumping station. Within 2 hours of connecting the systems, he was being attacked primarily from China.
October 16, 2014 Added by:Anton Chuvakin
Security incidents call for an immediate incident response (by definition), while alerts need to be reviewed via an alert triage process in order to decide whether they indicate an incident, a minor “trouble” to be resolved immediately, a false alarm or a cause to change the alerting rules in order to not see it ever again.
October 16, 2014 Added by:Brian Prince
A coordinated effort by security companies has struck a blow against malware tools used by a cyber-espionage group known as Hidden Lynx.
October 15, 2014 Added by:Tripwire Inc
What we often don’t realize, however, is the amount of personal information our phones actually store and how easily accessible we make this data, not only for ourselves, but for others, too. A recent Android study proves many of us are likely not careful enough.