Industry Insight News, Articles and Updates

Microsoft bans passwords from breach lists

Microsoft bans passwords from breach lists

By

On the heels of a breach last week at LinkedIn that exposed passwords of 117 million users, Microsoft has put in place new password security for users of its Azure Active Directory.

Wekby hacker gang using DNS requests in new malware campaign

Wekby hacker gang using DNS requests in new malware campaign

By

A long-time hacker group is using DNS requests as a command-and-control mechanism in a new series of malware attacks.

Study: Federal agencies still lack strong cyber hygiene practices

Study: Federal agencies still lack strong cyber hygiene practices

By

A new study showing how federal agencies still don't have a firm grasp of cybersecurity practices was ironically released just days after the third-party contractor hired to fortify the U.S. Office of Personnel Management's systems suddenly quit.

Adobe patches Connect untrusted search path vulnerability

Adobe patches Connect untrusted search path vulnerability

By

A security update for Adobe Connect for Windows released Monday resolves an untrusted search path vulnerability in the add-in installer for Connect versions 9.5.2 and earlier.

Destroy your data responsibly! International Recycling Day is 17 May

Destroy your data responsibly! International Recycling Day is 17 May

International Recycling Day is held today, 17 May to caution businesses that being green and responsible recycling is vital to destroy data on disused devices

IT pros in financial services assert ability to detect breaches

IT pros in financial services assert ability to detect breaches

Data breaches in the worlds of banking, credit and finance have nearly double between 2014 and 2015 according to the Identity Theft Resource Centre's 2015 Breach List report. Despite being unsure of how long it would take, IT pros in financial services are very confident in their ability to detect a breach.

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

Yahoo's second wave of declassified FISC docs spotlights battle with feds over PRISM

By

Yahoo has released its second wave of Foreign Intelligence Surveillance Court (FISC) documents concerning a 2007 case over user data.

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

Study: Apple, Android should better vet app stores, notify users of 'dead apps'

By

Appthority's Q2 2016 Enterprise Mobile Threat Report found Apple and Android should better vet their app stores.

Microsoft report: 9.4 percent increase in vulnerability disclosures

Microsoft report: 9.4 percent increase in vulnerability disclosures

By

Microsoft noted a 9.4 percent increase in vulnerability disclosures to just above 3,300 disclosures in its latest study.

Researchers discover ICS attack method that spreads through networks

Researchers discover ICS attack method that spreads through networks

By

A team of researchers discover a new method of launching attacks that would threaten global critical infrastructure and utility providers through a worm that spreads through utility networks.

Study: 17 percent of IT pros confident they can defeat cyberattacks

Study: 17 percent of IT pros confident they can defeat cyberattacks

By

A recent study found that only 17 percent of IT professionals were confident in their ability to defeat cyberattacks.

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

By

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.

Where are all the security pros?

Where are all the security pros?

By

IT security is finally becoming a priority - not only for IT professionals in every industry, but also for the C-suite, says Marcin Kleczynski, CEO, Malwarebytes.

Who owns information security risk in your organization?

Who owns information security risk in your organization?

Security is a business risk that needs to be understood and owned by your business leaders, says Jeff Brown, former technology risk officer, AIG.

Hot or not, this industry is still growing up

By

Even with all the hoopla, there are CISOs still having challenges, vendors that aren't meeting needs, and companies still giving security short shrift, says Illena Armstrong, VP editorial, SC Magazine.

Educating boards

Educating boards

By

C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.

DDoS attacks still growing...and stronger, Kaspersky

DDoS attacks still growing...and stronger, Kaspersky

By

Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

By

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

Cyberattacks increase against manufacturing, healthcare industries

Cyberattacks increase against manufacturing, healthcare industries

By

Report examines the shifting direction of cyberattacks noted attackers turning their attention away from financial services, in favor of attacks against manufacturing and healthcare companies.

Most orgs couldn't quickly detect breach, study

Most orgs couldn't quickly detect breach, study

By

Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.

Google's Android Security report shows some Android users left behind

Google's Android Security report shows some Android users left behind

By

Despite the many efforts Google undertakes to protect its customers from malicious applications, many Android users may remain vulnerable to attack because they're using outdated software.

Data breaches fueled valuations of cyber firms

Data breaches fueled valuations of cyber firms

By

Stoked by headlines announcing major data breaches, the stock valuations of cybersecurity companies outperformed the Nasdaq and S&P 500 by double over the past three years.

CCOs fear increased liability from recent compliance changes in Washington

CCOs fear increased liability from recent compliance changes in Washington

By

Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.

Oculus exec says VR privacy questions will be answered 'in due time'

Oculus exec says VR privacy questions will be answered 'in due time'

By

Oculus exec says U.S. Senator's privacy policy questions on VR data collection will be answered "in due time."

Millennials more likely to store sensitive data on mobile devices, study

Millennials more likely to store sensitive data on mobile devices, study

By

An Equifax study found millennials were more likely to store sensitive data on their personal devices.

Research: Over 6,000 data breaches in key industry sectors since 2005

Research: Over 6,000 data breaches in key industry sectors since 2005

By

The Identity Theft Resource Center (ITRC) and IDT911 said that to date, the financial services, business, education, government and healthcare industrial sectors have experienced over 6,000 data breaches since 2005.

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

By

Cybersecurity is the greatest threat since the atom bomb, said Apple co-founder Steve Wozniak.

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

By

Stealing $100 million from a major U.S. corporation should be hard than setting up a fake email account, but for one cybercriminal enterprise this is all it took.

Malware in surveillance cameras sold on Amazon

Malware in surveillance cameras sold on Amazon

By

Malware allegedly found in Urban Security Group's (USG) Sony Chip HD 6 Camera 1080P PoE IP CCTV surveillance camera kit.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US