Blog Posts Tagged with "Headlines"

69dafe8b58066478aea48f3d0f384820

Application Layer DDoS Attacks Decline in Q2 2012

July 18, 2012 Added by:Headlines

“Q2 data showed a return to traditional infrastructure attacks and is likely a reflection of changing tools for launching DDoS attacks. With Layer 7 attacks, the risk of detection and eventual take down by law enforcement increases because these attacks disclose the IP address of the attacking botnet..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Study Finds Minimal Transparency in Breach Reports

July 17, 2012 Added by:Headlines

"Other than breaches reported by the media and a few progressive state websites, there continues to be little or no information available on many data breach events. The public has no way of knowing just how minor or serious the data exposure was for any given incident," ITRC states...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force's Tactical Cyber Wing Gets New Commander

July 17, 2012 Added by:Headlines

The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet was Only the Beginning of US Cyberwar Against Iran

July 16, 2012 Added by:Headlines

"Almost all cyberattacks are 'to whom it may concern' but Stuxnet was a bullet with someone's name on it. Repeating something like Stuxnet or (computer virus) Flame will be much more difficult... But the defender needs to plug all holes, while the attacker need only find one..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Has Backdoor Access to Eighty-Percent of Communications

July 16, 2012 Added by:Headlines

Former Pentagon analyst F. Michael Maloof warns that the Chinese government has backdoor access to as much as eighty-percent of the worlds telecom traffic, giving the regime access to sensitive communications made possible by equipment from two Chinese based telecom giants - Huawei Technologies and ZTE...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yahoo!'s No Encryption Trumps LinkedIn's Unsalted Hash

July 12, 2012 Added by:Headlines

Just a month after LinkedIn experienced a significant security breach and caught flack for not "salting their hash", the revelation that the Yahoo! credentials were not even stored in an encrypted format should have everyone concerned about how seriously companies are taking the security of their users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vulnerability Scans too Disruptive to Conduct Regularly

July 12, 2012 Added by:Headlines

“Evidently, active vulnerability scanning can cause huge management headaches due to its disruptive nature and information overload, so scanners tend to be used primarily for ‘spot checks’ that aren’t effective at minimizing risks. Critical vulnerabilities have to be identified, prioritized, and remediated daily..."

Comments  (4)

69dafe8b58066478aea48f3d0f384820

NIST Releases Federal ID Security Standard Draft for Comment

July 12, 2012 Added by:Headlines

The document is the next step toward updating Federal Information Processing Standard (FIPS) 201. Among its requirements are that all PIV cards contain an integrated circuit chip, a personal identification number and protected biometric data—a printed photograph and two electronically stored fingerprints...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DHS Cyber Teams Uncover Federal Network Vulnerabilities

July 11, 2012 Added by:Headlines

"We provide free specialized access to skills and services that are not readily available or are in high demand across the dot-gov to promote a healthy and resilient cyber infrastructure. That's the goal to do risk-based analysis and gap analysis of capabilities and drive improvements..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Multi-Platform Backdoor Malware in the Wild

July 11, 2012 Added by:Headlines

"The JAR file checks if the user's machine is running in Windows, Mac or Linux then downloads the appropriate files... the three different platforms behave the same way. They all connect to 186.87.69.249 to get additional code to execute. The ports are 8080, 8081, and 8082 for OSX, Linux, and Windows respectively..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Chief: Cyber Presents Opportunities and Challenges

July 11, 2012 Added by:Headlines

“If the critical infrastructure community is being attacked by something, we need them to tell us at network speed... It requires them - the Internet service provider or that company - to tell us that that type of event is going on at this time. And it has to be at network speed if you’re going to stop it...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Thousands of Sites Hacked with Plesk Zero Day Exploit

July 10, 2012 Added by:Headlines

"What is interesting is that most of our clients always used to be using CMSs (like WordPress, Joomla, etc), but lately we are seeing such a large number of just plain HTML sites getting compromised and when we look deeper, they are always using Plesk..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage and the Greatest Transfer of Wealth in History

July 10, 2012 Added by:Headlines

"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MMarketPay.A Android Malware Found in the Wild

July 09, 2012 Added by:Headlines

Researchers have discovered a new malware strain targeting Android devices that is designed to make unauthorized purchases from infected units. The malware has been detected as being spread by at least nine different application markets and may have infected as many as one-hundred thousand users...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Homeland Security Enhances Cybersecurity Team

July 09, 2012 Added by:Headlines

"These new members of our vast cybersecurity team bring a wide array of experience and skills. Building on the successes of our strong and robust team, we are taking the DHS cybersecurity program to new levels that will ultimately enhance the security and safety of our nation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA: High Roller Online Bank Robberies Reveal Security Gaps

July 05, 2012 Added by:Headlines

The old adage that “criminals go where the money is” means that bank robbers go online, Executive Director of ENISA, Professor Udo Helmbrecht states. It should come as no surprise that large organized crime groups are targeting online banking sites. Still, the attacks drew much attention for three reasons...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »