Security Awareness

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence Report – August 2017

August 11, 2017 Added by:Alexander Polyakov

The August 2017 set of SAP Security Notes consists of 19 patches with the majority of them rated medium.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Evasive Malware on the Rise: Time to Stop Stealth Attacks in their Tracks

August 11, 2017 Added by:Eddy Bobritsky

We need to develop and implement creative solutions that are broadly effective at turning “easy target” endpoints into dead ends for hackers and their tricks.

Comments  (0)

D47338e40e87fbbb10a052dd9c98ac89

Enterprises: Can You Handle 3,680 Phishing Emails per Week?

August 08, 2017 Added by:Kevin O'Brien

As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

Why We Must Work Together to Support Our Cyber Start-ups

August 01, 2017 Added by:Bernard Parsons

With both the number and severity of cyber attacks only set to increase over the next few years, it is essential we do everything we can to support the next wave of homegrown cyber entrepreneurs, innovators and practitioners.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Cyber Threat Intelligence report – July 2017

July 14, 2017 Added by:Alexander Polyakov

July 2017’s set of SAP Security Notes consists of 23 patches with the majority of them rated medium.

Comments  (0)

Bb41d7ba746e551cbae52d2aaab4f625

WannaCry: How We Created an Ideal Environment for Malware to Thrive, and How to Fix It

July 12, 2017 Added by:Jesse McKenna

How in the world did we end up with a security paradigm where a malware infection can spread so rapidly and so broadly as WannaCry did?

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

NotPetya — 'Ransomware' That Spreads like a Worm

July 12, 2017 Added by:Sean Tierney

NotPetya techniques led researchers to believe the true goals of the attack was disruption rather than monetary gain.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Convenience Comes at a Steep Price: Password Management Systems & SSO

July 12, 2017 Added by:Alexandre Cagnoni

Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).

Comments  (0)

0756e5785a4308aa22f17fa1757680bf

How Does Samba Compare to WannaCry?

July 05, 2017 Added by:Rotem Iram

Many reports are drawing comparisons between the Samba vulnerability and WannaCry, but they don't pose the same widespread risk.

Comments  (0)

F5a99fda189e83ed3f4ce79415910cee

The Security Risk Within Smart Cities

June 30, 2017 Added by:Mirko Brandner

Smart cities offer great opportunities and, in terms of IoT innovations security, data protection and privacy have to be top priority if they should be profitable in the long run.

Comments  (0)

E3fc80dfc564927d51a4d7320b45d6fa

Survey Shows Employers under Pressure to Keep Mobile Workers Safe

June 30, 2017 Added by:Vincent Geffray

According to a new report from Everbridge, 77% of employers said their employees would prioritize safety over privacy concerns when it comes to identifying their location during a critical event.

Comments  (0)

0a1751b23118a107c6c19cf551c34dca

Lax IIoT Cybersecurity: the Perfect Breeding Environment for Industroyer

June 29, 2017 Added by:Jalal Bouhdada

In meeting the challenge posed by greater levels of threats and fewer cybersecurity specialists to meet them, a shift in focus is essential.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

Cddf97a969951d5d4db2728c7894524b

Malware Prevention Key to Countering Evasive Attack Techniques

June 28, 2017 Added by:Eddy Bobritsky

We can’t stay in the malware arms race by building a tool for every trick malware creators conjure up. It’s critical that we develop broadly applicable methods that frustrate their efforts by turning those tricks into defensive weapons.

Comments  (0)

81150be5971b06d836999bd9f01812f2

Make Sure We're Using the Same Language

June 27, 2017 Added by:Jay Kelley

Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »