Latest Blog Posts

33e341295f31dc98f191961ddd26bcba

When Ransomware Strikes: Does Your Company Have a Data Disaster Recovery Plan?

February 16, 2017 Added by:Jeff Erramouspe

Ransomware is rampant and those who commit the attacks aren’t discriminating against any industry, company size, or company location.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DynA-Crypt Ransomware Steals and Deletes User Data

February 11, 2017 Added by:Ionut Arghire

A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

Managing External Connectivity to and From Your Network: Do’s & Don’ts

February 07, 2017 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder of AlgoSec, explains how external connections to partner networks should be managed to maximize security and efficiency

Comments  (0)

306708aaf995cf6a77d3083885b60907

2017 Singapore ICS Cyber Security Conference Call for Papers is Open! (APAC)

February 01, 2017 Added by:Mike Lennon

The official Call for Papers (presentations) for SecurityWeek's 2017 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 25–27 at the Fairmont Singapore is now open.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android Trojan Downloads Google Play Apps onto SD Cards

February 01, 2017 Added by:Ionut Arghire

A newly discovered Android Trojan can download applications from Google Play, but saves them onto the SD card instead of installing them, to keep this malicious activity hidden from the user.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

New Year’s Resolution 2017: Build Better Security Programs

January 30, 2017 Added by:Steve Durbin

Enterprise risk management must build on a foundation of preparedness to create risk resilience by evaluating threat vectors from a position of business acceptability and risk profiling.

Comments  (0)

C66e591693fd6e7b26fc5a60efb68817

Alan Turing, Undecidable Problems, and Malware

January 23, 2017 Added by:Kenneth Geers

In order to keep workers happy and productivity high, sometimes you have to run untrusted code. But that code should be run in quarantine, where it cannot damage your IT infrastructure.

Comments  (0)

C834d47d31dd1a1b3371bda639105c59

The Forgotten Security Frontier: The Phone Call

January 23, 2017 Added by:Myk Konrad

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – January 2017

January 13, 2017 Added by:Alexander Polyakov

SAP's first set of SAP Security Notes for 2017 includes 23 security patches, one considered Hot News (assessed 9.8 by CVSS base score v.3.0).

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Distributed in Post-Holiday Spam Run

January 12, 2017 Added by:Ionut Arghire

A spam distribution campaign spotted just after the holiday season has ended is distributing the Neutrino Bot via a linked malicious Office document, Malwarebytes Labs security researchers warn.

Comments  (0)

D8b99a423ff6dd0a2b3436ad64038f7a

Why Simply Increasing Cybersecurity Staffing Won’t Resolve All of Today’s Issues

January 12, 2017 Added by:Nathan Wenzler

Any security program can benefit immediately by reviewing internal policies, improving the metrics used to measure their program's success, and consulting with legal counsel to ensure proper insurances and other risk mitigation plans are in place.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

Using Artificial Intelligence for Security Automation, Orchestration and Response

January 11, 2017 Added by:Nathan Burke

When a new threat is uncovered, an artificially intelligent system is able to apply its newly-found knowledge to all other systems in its network, launching investigations to find out whether other machines exhibit evidence of the threat or threat type.

Comments  (0)

D99975c323ad3ec7e199a4b5b1c374d7

Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response

December 23, 2016 Added by:Gary Southwell

Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.

Comments  (0)

F142e224c520497854138dc9fabbac94

Stop Living with FUD: Build Security with Confidence, Assurance and Resiliency

December 23, 2016 Added by:Mike Kail

With expensive cybercrime on the rise, companies across the globe are constantly trying to improve their security stance. As a result, many security vendors have taken advantage of this vulnerability with a FUD approach.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »