Email Alerts
-
Spear phishing, manpower drive Chinese APTs, says researcher at RSA 2013
Chinese cyberattacks rely on spear phishing and overwhelming numbers, not sophisticated attack methods, says a researcher at RSA Conference 2013. News | 27 Feb 2013
-
The body count is new, but UPnP security issues are embarrassingly old
HD Moore unveiled research showing wide-scale UPnP security issues last week, but some of the problems have been known for years. News | 06 Feb 2013
-
Offensive security involves proactive deception tactics
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers. News | 28 Jan 2013
-
Project Mayhem hack details enterprise accounting system flaws
Proof-of-concept code targets Microsoft Dynamics Great Plains platform and can enable an attacker to transfer funds to accounts of their choosing. News | 27 Dec 2012
-
Experts develop protections for product piracy, intellectual property theft
Detecting product piracy and intellectual property theft is expensive, but adding a hidden 'watermark' may make the process easier and cost-effective. News | 05 Dec 2012
-
Many in industry at odds over pending cybersecurity executive order
Some security industry veterans fear regulatory overreach, others believe an executive order won't go far enough. News | 03 Dec 2012
-
Go Daddy responding to malicious DNS entries
Weak passwords may be enabling attackers to hack the DNS records of some Go Daddy hosted websites to spread ransomware. News | 26 Nov 2012
-
Deception, proactive defenses can better protect IP, says expert
Deceptive environments, phony data in the enterprise can fool attackers and increase the cost of hacking, says noted cybersecurity expert Paul Kurtz. News | 20 Nov 2012
-
RSA president: Better analytics, info sharing lifts enterprise security
Sharing practical threat data can reduce the "dwell time" of an attacker and better detect and contain problems, said Tom Heiser, president of RSA. News | 20 Nov 2012
-
Report highlights supply chain insecurities, downplays mobile threats
A Georgia Tech report on cybersecurity is downplaying mobile threats, but explains that supply chain weaknesses will continue to dog manufacturers and software makers. News | 16 Nov 2012
Security Management Strategies for the CIO