Items Tagged with "report"


58bc13ef5da5ac4fc32d41c3fbc0e460

Leaking Vault Update: Records Breached Figure Passes One Billion

January 31, 2012 Added by:Suzanne Widup

Although 2007 and 2008 grew the most in terms of additional incidents being disclosed, 2008 showed the highest number of additional records, with almost 95 million. Though 2011 is not the highest in terms of incidents, it is now the leader for records disclosed thus far...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Report on Network Information Security in Education

January 30, 2012

ENISA's Report on Network Information Security in Education comes at a time when education and ITC are interconnected more than ever. The challenge of the digitally active citizen is to remain informed on the news coming from the dynamic field of Information Security...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Maritime Cybersecurity Low to Non-Existent

January 24, 2012 Added by:Joel Harding

Instead of buying a ship for the relatively cheap price of $15 million, one could simply take control of the ship remotely and guide it into a target from thousand of miles away. Imagine the boom that 135 million cubic yards of natural gas could make if an LNG ship were run aground...

Comments  (12)

7fef78c47060974e0b8392e305f0daf0

ENISA Report on Trust and Reputation Models

January 23, 2012

Reputation systems are a key success factor of many websites, e.g. eBay, or Amazon, ranking hotels, films, or music, enabling users and customers to vote on products. However, by using reputation systems, citizens place themselves at additional risk...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Analyzing the Poneman Study on Privileged Users

December 29, 2011 Added by:Rafal Los

How much access do those employees and system administrators have to your critical intellectual property, company secrets and other secret information? And how often do they take a peek behind the curtain... you know, just for curiosity?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Secure Communications for CERTs and Stakeholders

December 29, 2011

ENISA seeks to identify the most suitable technology and platform to provide secure channels to improve communications with CERTs and other stakeholders. Secure transportation of information assures some combination of confidentiality, integrity and authenticity of the data...

Comments  (0)

Fe3139b2aae983885565da7757da08a8

Chrome Most Secure? Depends on Your Frame of Reference

December 21, 2011 Added by:Ed Moyle

Until recently Chrome supported SSL 2.0 by default (seems like a major no-no in my humble opinion) and the fact that Firefox is the only one of the big three to have OCSP checking enabled by default. This aspect of "browsing security" is a "score one" for Firefox in my estimation...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

ENISA Report on Maritime Cyber Security

December 20, 2011 Added by:Stefano Mele

Due to the high complexity, it is major challenge to ensure adequate maritime cyber security. Development of good practices for the technology development and implementation of ICT systems would therefore ensure “security by design” for all critical maritime ICT components...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Measuring Information Security Effectiveness

December 11, 2011 Added by:Bill Gerneglia

“The face of cyber threats has rapidly evolved from curious college kids taking their hand at hacking to an enormous global ecosystem of cyber-crime. Companies need a comprehensive approach to security technology, education and awareness and a very small number have truly mastered all three...”

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Report: Proactive Detection of Network Security Incidents

December 09, 2011

The report reveals that not all available tools are used by the ‘’digital fire-brigades’’, the Computer Emergency Response Teams (CERTs) to effectively fight cyber threats. Therefore, the Agency issues 35 recommendations to data providers and consumers to mitigate the shortcomings...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Malware Infection Rates – Who Has the Most Viruses?

December 07, 2011 Added by:Dan Dieterle

A look at the top viruses for each country shows a lot of cookie based viruses. Which may or may not be real viruses, but the rates are high none the less. But how does this compare to what other vendors are finding?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA Releases DigiNotar Report: Operation Black Tulip

December 06, 2011 Added by:Headlines

"The Diginotar attack was an attack on the foundations of secure electronic communications (email, web browsing, web services). The above-mentioned issues should be addressed by industry and governments, to guarantee the security of service in the digital society..."

Comments  (0)

Fe3139b2aae983885565da7757da08a8

HIT Security: Conclusions in a Contradictory Report-Sandwich

December 02, 2011 Added by:Ed Moyle

The barometer that the Ponemon study uses (i.e. breach disclosures, breach impact) could actually be an indicator of better security instead of worse. It could be the case that breaches are on the rise because we're finding them more because not looking for them so violates federal law...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »