Blog Posts Tagged with "Security"

Ffc4103a877b409fd8d6da8f854f617e

What We Know About Shellshock and Why the Bash Bug Matters

September 26, 2014 Added by:InfosecIsland News

Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.

Comments  (0)

457ad4752923de991424e3d0f5a6abb6

Shining a Light on Industrial Control Networks with Purpose Built Intrusion Detection Systems

September 16, 2014 Added by:Nate Kube

There are differences between industrial control systems and enterprise IT networks resulting in different security needs. To protect industrial networks, system operators must opt for an industrial next gen firewall with an IDS that fully understands industrial protocols and the specific context of each industrial command.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Verizon Publishes Vastly Expanded Data Breach Investigations Report (DBIR)

April 22, 2014 Added by:InfosecIsland News

Point-of-sale (PoS) attacks are declining, while Web application attacks and cyber-espionage is increasing, according to the latest edition of the annual Verizon Data Breach Investigations Report (DBIR).

Comments  (0)

37c1b0270687e8148e56508e805f8b8e

The Windows XP Rundown is Really About Security

March 18, 2014 Added by:Praveen Manohar

Now is an appropriate time to discuss the implications of the end of XP support and explore what the rundown is really all about: security.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Passwords: Are We Focused on the Right Issues?

February 21, 2014 Added by:Anthony M. Freed

Recently, Dashlane released its quarterly Personal Data Security Roundup (PDF), which examines the “illusion of personal data security in e-commerce,” noting that consumers increasingly share personal and payment information with online retailers, and the only thing standing between that data and criminals is a mere password.

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

CFO’s Don’t Want to Get it When it Comes to Risk and Security…Until it’s Too Late.

February 06, 2014 Added by:Stephen Marchewitz

According to Ponemon estimates (PDF), the breach will cost Target over $2 Billion dollars. Will Target's CFO get fired? He probably couldn’t spell security before the incident, but had to testify before congress about what they’re going to do…talk about your crash courses.

Comments  (1)

2fb7499ecf0556150d20d49a5e92486c

There's a New Sheriff in Town – PCI DSS Lays Down the Law to Improve Pen Testing Requirements

January 29, 2014 Added by:Michael Sabo

The PCI’s 12 mandatory requirements are designed to protect cardholder data from the threat of fraud or theft. Requirement 11.3 gets to the heart of the pen test, and it was revised in PCI-DSS version 3.0.

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

The Perils of Combining Security and Compliance

January 27, 2014 Added by:Robb Reck

There is a natural tendency to lump security and compliance together. Intuitively it just makes sense right? The biggest compliance frameworks like PCI, GLBA, SOX and HIPAA are all looking to ensure that our security is up to snuff. In fact, if we do security right, compliance should come naturally, with very little additional technical work.

Comments  (0)

96c94e903c09719ad525aa2b551d0eae

Consider Security Before Building Your Nest

January 23, 2014 Added by:Robert Shaker

We have already seen attacks from the virtual world affecting the physical world, so, wouldn't it be great if an attacker could shut down our refrigerators or the chillers and freezers in the Supermarkets?

Comments  (2)

86d8831c7ce6fcda920aac867a984d98

Improving SCADA System Security (Part 1)

December 21, 2013 Added by:InfoSec Institute

Supervisory control and data acquisition (SCADA) networks are considered by cyber strategists to be the backbone of any country. Critical infrastructure, and in particular control systems, require protection from a variety of cyber threats that could compromise their ordinary operation.

Comments  (0)

0b3620b53fede5eaa3256c2c0bbea3ba

Using iGoat to Explore Mobile Application Security Weaknesses

December 16, 2013 Added by:Michael Smith

The purpose of this post is to walk through all the steps needed to get iGoat setup “Soup to Nuts”. There is nothing here that is too difficult, but there are a few pitfalls in making this work.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Why Security Issues May Chronically Hinder Bitcoin Adoption

December 03, 2013 Added by:Tripwire Inc

This article is mostly inspired by Jeff Garzik’s post, “‘Solution’ to bitcoin volatility,” in which Jeff, a Bitcoin core developer, discusses the price volatility which many feel is holding back Bitcoin from being a usable currency.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Free Security Event This Thursday in New York City

November 05, 2013 Added by:InfosecIsland News

Please join Trend Micro and SecurityWeek on Thursday, Nov. 7th at Blue Fin at the W Hotel in Times Square for an interactive security event with great food and open bar!

Comments  (0)

631e72bff10f695d4be8dec9d08d7534

Preparing for the Internet of Things: Integrating Strong Authentication in Daily Life

November 04, 2013 Added by:Jochem Binst

The online world as we know it today is not the same as the one we got to know in the beginning of the Internet era and certainly not the one that is emerging today! People worldwide are starting to realize this. All they have to do now is act on it. Strong authentication to secure the online world will be embraced since it becomes a necessity; using strong authentication is the next step.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

5 Common Windows Hardening Misconfigurations

October 31, 2013 Added by:Rohit Sethi

Over numerous Windows configuration review engagements that we have performed for our clients, we observed a common pattern in the configuration weaknesses that are worth highlighting here.

Comments  (0)

514b2ac354098d84c07620f2591193b2

What Is Your Browser Doing Behind Your Back?

October 09, 2013 Added by:Kyle Adams

Browsers have become extremely complex over the last few years, so does everyone fully understand everything a modern browser does? Of course everyone is familiar with the point and click, redirections, forms . . . normal Web stuff. What you might not know, is that your browser does a lot of things automatically without you asking it to.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »