Social Engineering
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password
January 29, 2015 Added by:Patrick Oliver Graf
Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?
Comments (5)
Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014
January 22, 2015 Added by:Patrick Oliver Graf
Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?
Comments (1)
New Adobe Flash Zero-Day found in the Wild
January 22, 2015 Added by:Malwarebytes
Security researcher Kafeine has discovered a Zero-Day in Adobe Flash Player distributed through the Angler Exploit Kit.
Comments (1)
Cyber-Civic Responsibility
January 21, 2015 Added by:Brent Huston
The only thing that really has a chance of working is if we all start taking responsibility for our own share of the problem.
Comments (4)
Buying Illegal Goods on the Digital Underground
January 19, 2015 Added by:Tripwire Inc
The fact that Silk Road has returned is a testament to users’ ongoing ability to purchase illegal goods online, not to mention merchants’ ability to sell these products.
Comments (2)
Social Engineering: How Dangerous is Your Lunch Break?
January 15, 2015 Added by:Tripwire Inc
If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.
Comments (0)
How to Avoid Getting Phished
January 14, 2015 Added by:Brent Huston
It’s much easier for an attacker to “hack a human” than “hack a machine”. This is why complicated attacks against organizations often begin with the end user.
Comments (2)
How to Protect Against Virulent Ransomware
January 07, 2015 Added by:Rebecca Herold
In early December, there were several reports about yet another type of ransomware, VirRansom, the next evolution of ransomware. It combines the ransomware feature of making data unavailable and locking up your computer until you pay the crooks a ransom with the feature of a virus, which allows it to spread to others.
Comments (4)
Top 10 Phishing Attacks of 2014
December 16, 2014 Added by:Ronnie Tokazowski
While attackers are loading up their phishing emails with new malware all the time, the majority of their phishing emails use stale, recycled content.
Comments (10)
Regin: A Malicious Platform Capable Of Spying on GSM Networks
November 25, 2014 Added by:InfosecIsland News
Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.
Comments (3)
Avoiding the Bait: Helpful Tips to Protect Yourself Against Phishing Scams
November 24, 2014 Added by:Tripwire Inc
Phishing scams come in all shapes and sizes. But one thing is for certain: they are all around us.
Comments (2)
Hacker Myths Debunked
October 20, 2014 Added by:Tripwire Inc
Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.
Comments (0)
iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge
October 07, 2014 Added by:Cyphort
Nowadays, as half of newly issued computers in the enterprise are Macs, OSX malware is also becoming more prevalent.
Comments (3)
Computer Security is Your Own Responsibility
September 24, 2014 Added by:Brent Huston
The biggest part of computer security is just mundane, common sense stuff.
Comments (0)
A Tale of Two Professionals
September 09, 2014 Added by:Neohapsis
Due to the disclosure of their phone numbers coupled with the power of Google and other search engines, the potential for extortion by a random individual who is now in possession of compromising photos is also a reality.
Comments (0)
Are Connected Cars on a Collision Course with Network Security?
August 26, 2014 Added by:Patrick Oliver Graf
Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps