News

News

  • July 08, 2015 08 Jul'15

    Industrial espionage group hacked Apple, Facebook, Microsoft

    A mysterious hacker group has hit a number of major U.S. companies with the intent of committing industrial espionage, according to new security research reports.

  • July 08, 2015 08 Jul'15

    Adobe patches Flash zero-day found in Hacking Team data breach

    Adobe patches a Flash zero-day vulnerability found as part of the massive data breach of Hacking Team. Experts recommend speedy remediation as the flaw has been added to multiple exploit kits.

  • July 07, 2015 07 Jul'15

    Critical OpenSSL patch coming Thursday

    The OpenSSL project team will release a critical patch on Thursday and experts warn admins that the upgrade process could take days or weeks to complete.

  • July 06, 2015 06 Jul'15

    Hacking Team internal documents released after massive data breach

    Controversial Italian surveillance software firm, Hacking Team, was attacked, resulting in a 400 GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.

  • July 02, 2015 02 Jul'15

    Why Web browser security is a goldmine for attackers

    Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • June 30, 2015 30 Jun'15

    US government passwords stolen and leaked around the Web

    A report reveals that many stolen US government agency passwords traveled across the Web, including credentials from OPM, which was recently breached due to stolen passwords.

  • June 26, 2015 26 Jun'15

    DNS vulnerability found in RubyGems software packaging client

    RubyGems software packaging client was found to have a DNS vulnerability that redirects users to malicious gem servers.

  • June 26, 2015 26 Jun'15

    Click fraud to ransomware: Study highlights dangers of malware lifecycle

    New roundup: Sometimes the least of threats -- such as click fraud -- can end up being the bigger issues -- like ransomware. Plus: U.S. Navy won't let go of XP; U.S./China cyber code of conduct; and more!

  • June 25, 2015 25 Jun'15

    Stolen passwords to blame for OPM breach; director may take the fall

    The OPM director told a Senate hearing that passwords stolen from a contractor led to the OPM breach. Now, her job is on the line and the number of breached records could be on the rise.

  • June 24, 2015 24 Jun'15

    Growing threats make security vulnerability management essential

    At RSA Conference 2015, Qualys CTO Wolfgang Kandek said enterprises need to be smart about how they tackle security vulnerabilities because there are simply too many for organizations to handle.

  • June 23, 2015 23 Jun'15

    Adobe releases emergency Flash zero-day patch

    Adobe releases an emergency Flash Player patch for a zero-day flaw said to be used in a Chinese hacker group's phishing scheme.

  • June 23, 2015 23 Jun'15

    Study: government compliance-based vulnerability remediation is failing

    In its State of Software Security Report, Veracode has found the government has the most vulnerabilities and the lowest rate of remediation in developing Web and mobile apps.

  • June 23, 2015 23 Jun'15

    NIST guidance: Better security from federal contractors

    With the recent OPM breach raising questions about the security of federal data within the government, NIST has issued new guidelines in order to secure data stored by federal contractors outside government facilities.

  • June 23, 2015 23 Jun'15

    Watters: 'Cyber officers' are now risk officers for businesses

    More data is thought to be a good thing in terms of threat intelligence, but iSight CEO John Watters says enterprises need to be aware of the quality and context of the data when assessing risk.

  • June 19, 2015 19 Jun'15

    Apple sandbox flaws allow password stealing, communication interception

    News roundup: Details have emerged about weaknesses in OS X and iOS that allow attackers to upload malware and steal passwords and data. Plus: More jump on HTTPS bandwagon; CSO/CDO salaries increase; 23% of software app components contain flaws.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close