Research

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Web-based malware threats primary challenge for industry pros, survey says

By

Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.

New study finds malware variants skirting AV, mostly delivered via web

New study finds malware variants skirting AV, mostly delivered via web By

As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.

Members only: The Information Security Forum

By

Steve Durbin, global vice president for the Information Security Forum, discusses some of the problems security professionals face today.

Using new tactics, Asprox botnet goes unnoticed

By

Known for distributing postal-themed spam, the Asprox botnet has remained effective, though less noticeable due to evasion techniques.

The new fundamentals of security

The new fundamentals of security

We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.

Study finds that growth of security workers is needed, though budget constraints remain a hurdle

By

Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.

Malware once used exclusively for bank fraud is finding a new mission

By

Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.

Retail, food service industry top target of fraudsters

By

Attackers primarily want cardholder data, which can be easily bought and sold underground to commit fraud, according to security firm Trustwave.

One-fifth of malicious mobile websites are porn-related

By

In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.

New report urges security and privacy settings in networks

By

Behind the rallying cry, "Privacy equals freedom," Ontario's Information and Privacy Commissioner Ann Cavoukian struck a partnership with Oracle to celebrate International Privacy Day: Jan. 28.

Ethical hacking incident brings rewards and expulsion for Canadian college student

By

A young, Montreal-based computer science student, his former college and the institution's IT provider all found themselves thrust into the media spotlight over the student's stance on ethical hacking.

An IPS on steroids: MetaFlows Security System

An IPS on steroids: MetaFlows Security System By

The secret behind the MetaFlows Security System (MSS) is that it really is a hybrid application.

U.S. hosts most botnet command servers worldwide

By

The U.S. hosts 631 active command-and-control hubs for botnets, according to McAfee.

Gen Y online behaviors have broadened threats

By

A younger workforce exhibiting risky online behavior is a trend that does not bode well for IT management faced with widening threats.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.

DARPA seeking to grow DoD cyber defense

By

The "Cyber Targeted-Attack Analyzer" program would examine data sources across DoD's entire network to aid in threat detection.

Debate: Bug bounty programs

Debate: Bug bounty programs - offering monetary rewards to researchers - help make companies more secure.

Update fixes hole in Facebook Camera app

By

A bug report leads to an update in a Facebook app.

The ghosts of Microsoft: Patch, present and future

The ghosts of Microsoft: Patch, present and future

When you consider how many stakeholders are invested in Microsoft's Patch Tuesday, it's no wonder the monthly affair stirs up so much energy in the cyber world.

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."

Identity management

Identity management

Available solutions are challenged to detect and protect identity and authenticate users.

Security budgets again expected to rise next year

By

Mobile purchases are expected to make up large chunk of the increased security spend, according to The 451 Group.

Me and my job: Brian Calkin, Multi-State ISAC Security Operations

Me and my job: Brian Calkin, Multi-State ISAC Security Operations

A Q&A with Brian Calkin assistant director, Multi-State ISAC Security Operations Center at the Center for Internet Security.

Web exclusive: A look ahead

Web exclusive: A look ahead By

A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.

Online banking

Online banking

With massive DDoS attacks targeting specific accounts, online banking and other e-commerce activities are under seige.

DHS awards contracts for cyber security innovation

By

The U.S. Department of Homeland Security awarded 34 contracts to secure domestic critical infrastructure.

Researcher accused of violating malware copyright

By

Mila Parkour's cloud storage account on MediaFire was shut down Thursday and part of Friday due to alleged copyright infractions of patches and exploit samples she had studied.

Video: Legal guidance for security researchers

By

SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.

Sign up for our newsletters

POLL