Blog Posts Tagged with "Threats"
March 15, 2012 Added by:Alan Woodward
The fact that such large proportion of home machines host unknown malware hides a bigger threat. By hijacking so many PCs it is possible to mount a massive probing operation that can seek out high value targets that are susceptible to classic hacking attacks...
March 15, 2012 Added by:Jeffrey Carr
The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...
March 07, 2012 Added by:David Navetta
NIST notes that many of the changes were driven by particular security issues and challenges requiring greater attention including, insider threats, mobile and cloud computing, application security, firmware integrity, supply chain risk, and advanced persistent threats...
March 05, 2012 Added by:Darryl MacLeod
If you’re IT professional, and not necessarily one with a security focus, attending a conference like this would be well worth it. The threats discussed are very real and active. They will never go away, but that doesn’t mean the white hats should start waving white flags...
February 25, 2012 Added by:Rafal Los
Perhaps it is security professionals' diminished tolerance for FUD, or perhaps there is a collective awakening to the bigger picture, or it was just time for the chickens to come to roost. No matter, this drastic anti-FUD backlash is strong and I for one say it's about time...
February 08, 2012 Added by:Rafal Los
You have to keep close tabs on your employees, your friends, your enemies and those you would never suspect, because threats are ever-present and overwhelming. Keep a level-head, because the evolution of threat doesn't mean it's any more scary today than yesterday...
February 02, 2012 Added by:Simon Heron
There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...
December 06, 2011 Added by:Elizabeth Ireland
It’s ironic, but security policies themselves make it difficult for management to understand the relative value of various security investments, to pinpoint areas of risk, and to translate that information into continuous security improvements...
November 15, 2011 Added by:Scot Terban
I am sure there are many of you out there who feel like you are being branded the “Security Cassandra”. You come to them with dark prognostications of compromise, and they look upon you as either a paranoid delusional individual or someone to just be patted on the head...
October 07, 2011 Added by:Infosec Island Admin
A recent survey released by PWC cites that over 75% of organizations are in the dark when it comes to online threats to their businesses. Given this rather alarming statistic, we wanted to point you towards two relevant SC magazine webcasts on finding and pre-empting hidden threats...
September 13, 2011 Added by:Headlines
"We are not quite ready to propose a definitive definition... At this point, we are talking about threats that can originate anonymously within this cyber domain with potentially enormous consequences: physical destruction to economic chaos..."
May 25, 2011 Added by:Headlines
“With legitimate URL-shortening services attempting to tackle abuse more seriously, spammers seem to be experimenting with ways to establish their own services to better avoid disruption... We expect spammers to continue abusing them..."
April 25, 2011 Added by:Headlines
"We want the machines to take a more active part in their own protection. We want to use their brains to protect themselves, but always in the context of the policies of the system administrators and owners," said senior counselor for cyber security at the DHS Bruce McConnell...
April 18, 2011 Added by:Headlines
“The government keeps the damage we are sustaining from cyber attacks secret because it is classified. The private sector keeps the damage they are sustaining from cyber attacks secret so as not to look bad... The net result of that is that the American public gets left in the dark..."
April 11, 2011 Added by:Robert Siciliano
As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 reveals steady growth of threats to mobile platforms...
March 19, 2011 Added by:Simon Heron
This increased activity is probably caused by botnet herders attempting to increase the size of their botnets, and this will probably be followed by a corresponding increase in spam levels. It might be that the recent decline in Spam may be reversed...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013