Industry Insight

Report: Pros urged to roll out IT projects before they are security-ready

Report: Pros urged to roll out IT projects before they are security-ready

By

IT security professionals report that they are regularly pressured to roll out new technologies and devices regardless of whether they are secure, according to a new survey.

Malware museum features a virtual rogues gallery of nefarious coding

Malware museum features a virtual rogues gallery of nefarious coding

By

The non-profit Internet Archive library today unveiled a virtual Malware Museum, which offers a look back at some of the hacking community's earliest attempts to infect computers.

Thunderstrike 2 creators join their one-time target Apple

Thunderstrike 2 creators join their one-time target Apple

By

Apple has brought on board two security researchers who previously worked to develop the infamous Thunderstrike 2 worm.

Major banks to roll out ATMs that use smartphones for authentication

Major banks to roll out ATMs that use smartphones for authentication

By

Bank of America, Wells Fargo and JPMorgan Chase have announced plans to roll out ATMs that take smartphones as well as ATM cards.

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

By

A report today from Harvard University's Berkman Center for Internet and Society predicts that in lieu of backdoors to encrypted messaging apps, intelligence agencies will increasingly turn to less fortified vectors to conduct digital surveillance.

Intelligent threat intelligence

Intelligent threat intelligence

A combination of machines and humans is key to risk management, Carole Fennelly says.

Right-sized surety training

Right-sized surety training

Security awareness training aims not only to impart information, but also to change behavior.

FireEye report identifies iOS security storm-in-a-tea-cup

FireEye report identifies iOS security storm-in-a-tea-cup

FireEye researchers have released a report which details potential security issues with software used to dynamically patch iOS apps.

CISO salaries and demand for cyber-skills skyrockets, surprising no-one

CISO salaries and demand for cyber-skills skyrockets, surprising no-one

Two new reports from recruitment company BeecherMadden have shown demand for cyber-skills to be rising massively with few able to meet that demand while CISO salaries are also going up.

Data Privacy Day: Cybersecurity experts share advice on protecting data

Data Privacy Day: Cybersecurity experts share advice on protecting data

By

With Data Privacy Day now upon us, cybersecurity experts from across the industry have offered their advice on how both individuals and organizations can protect their data.

Data Privacy Day: Changes transform policy, perspective since last year

Data Privacy Day: Changes transform policy, perspective since last year

By

SCMagazine.com asked key thought leaders to identify key events in last year that have reshaped public policy and expectations of what happens—and what should happen—to personally identifiable information when users go online.

DDoS attacks on the rise - touching 500gbps

DDoS attacks on the rise - touching 500gbps

DDoS attacks are on the increase and getting bigger and more widespread, according to research released by Arbor Networks.

Consumers don't trust orgs to protect data, survey says

Consumers don't trust orgs to protect data, survey says

By

The majority of consumers surveyed by YouGov are skeptical that organizations securely handle the data they share online.

Report: Israel cybersecurity startups attract large investments

Report: Israel cybersecurity startups attract large investments

By

Cybersecurity startups hold a premium position within Israel's investment ecosystem and are second only to the U.S., according to researchers at YL Ventures.

Survey says: Data breaches in other industries will damage financial institutions

Survey says: Data breaches in other industries will damage financial institutions

By

Respondents to a new survey from FICO unanimously agreed: Data breaches this year in other industries will damage financial institutions.

Fortinet on SSH vulnerabilities: look, this really isn't a backdoor, honest

Fortinet on SSH vulnerabilities: look, this really isn't a backdoor, honest

Security firm goes full disclosure on mechanics of SSH issue and finds three more vulnerabilities

Survey: 64 percent of IT execs think achieving basic compliance will stop most breaches

Survey: 64 percent of IT execs think achieving basic compliance will stop most breaches

By

64 percent of more than 1,100 IT security executives believe that simply meeting cybersecurity compliance requirements, as opposed to striving for best practices, is "very" or "extremely" effective at preventing data breaches.

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth

By

Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.

Fortinet says remote access vulnerability wasn't malicious or a backdoor

Fortinet says remote access vulnerability wasn't malicious or a backdoor

By

Fortinet released a statement concerning a recently disclosed vulnerability that was referred to as a backdoor by some.

'High risk' for users of FRITZ!Box routers

'High risk' for users of FRITZ!Box routers

By

A number of remote code execution bugs in several models of FRITZ!Box broadband routers could allow intruders to place phone calls through the device.

Cybergang targets Japanese banks with Rovnix Trojan

Cybergang targets Japanese banks with Rovnix Trojan

By

Researchers at IBM X-Force have spotted an aggressive infection campaign targeting major Japanese banks.

Raspberry Pi declines bribe to pre-install malware

Raspberry Pi declines bribe to pre-install malware

By

The Raspberry Pi Foundation was offered money to pre-install malware on its inexpensive computers by someone claiming to be a "business officer."

Quantum leap?: Encryption

Quantum leap?: Encryption

By

Encryption will impact everyone from security personnel to consumers in the post-quantum computing world, reports Doug Olenick.

Shari Steele named executive director of the Tor Project

Shari Steele named executive director of the Tor Project

By

Digital rights activist Shari Steele took the reins Friday at the Tor Project as executive director.

Former agent sentenced to 71 months for stealing in Silk Road probe

Former agent sentenced to 71 months for stealing in Silk Road probe

By

Shaun Bridges, the former Secret Service agent who pleaded guilty to stealing $820,000 worth of Bitcoin during the Silk Road investigation, was sentenced in federal court to 71 months in prison.

78 bugs in last Adobe Patch Tuesday of the year

78 bugs in last Adobe Patch Tuesday of the year

By

Adobe patched 78 bugs in the last Patch Tuesday of 2015 including five Priority 1 vulnerabilities.

USB ports pose hidden risk for medical facilities

USB ports pose hidden risk for medical facilities

By

When visiting a medical facility, it can be tempting to charge a mobile device into a spare USB port, but the free charge may contain an unpleasant after-effect.

NSA shuttered bulk email program in 2011, replaced with similar initiatives

NSA shuttered bulk email program in 2011, replaced with similar initiatives

By

By the time the National Security Agency (NSA) nixed its email surveillance program in December 2011, other surveillance initiatives that could "satisfy certain foreign intelligence requirements" had taken its place, according to a report in The New York Times.

Critical infrastructure networks lacking in performance metrics

Critical infrastructure networks lacking in performance metrics

By

Network defense of the nation's critical infrastructure is sorely lacking, according to a report by the Government Accountability Office.

Report: Insider threat more dangerous than external risks

Report: Insider threat more dangerous than external risks

By

While external threats present an ever-present risk for large and small enterprises, a new report said the actions of a company's own employees, suppliers and partners pose more of an immediate danger.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US