August 2017
-
August 31, 2017
31
Aug'17
Spambot email leak compromises 711M records
An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts. Continue Reading
-
August 31, 2017
31
Aug'17
How NotPetya ransomware used legitimate tools to move laterally
WannaCry and NotPetya ransomware woke enterprises up to an expanded threat landscape. Expert Michael Cobb explains these threats and what enterprises can do to stop them. Continue Reading
-
August 30, 2017
30
Aug'17
How to detect and defend against a TCP port 445 exploit
The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend such attacks. Continue Reading
-
August 30, 2017
30
Aug'17
How to craft an application security strategy that's airtight
A solid application security strategy today must include varieties like cloud apps and mobile. Learn how to set application security policies and practices that keep hackers out. Continue Reading
-
August 29, 2017
29
Aug'17
Kaspersky-Russian ties still unclear, despite FBI push
The specter of Kaspersky-Russian ties has reportedly led to an FBI campaign urging private organizations to drop Kaspersky Lab products; experts urge the FBI to share more evidence. Continue Reading
-
August 29, 2017
29
Aug'17
hacker
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Continue Reading
-
August 29, 2017
29
Aug'17
Top cybersecurity conferences for when Black Hat and RSA aren't right
The big cybersecurity conferences can make attendees weary, but there are many alternatives to the big name shows that may be easier to get to and easier to handle. Continue Reading
-
August 29, 2017
29
Aug'17
What to do when cybersecurity breaches seem inevitable
The current threat landscape makes cybersecurity breaches seem unavoidable. Expert Peter Sullivan discusses some simple ways enterprises can reduce the risk of a breach. Continue Reading
-
August 28, 2017
28
Aug'17
Electronic voting systems in the U.S. need post-election audits
Colorado will implement a new system for auditing electronic voting systems. Post-election audits have been proven to help, but are they enough to boost public trust in the systems? Continue Reading
-
August 28, 2017
28
Aug'17
antivirus software (antivirus program)
Antivirus software is a class of program designed to prevent, detect and remove malware infections on individual computing devices, networks and IT systems. Continue Reading
-
August 28, 2017
28
Aug'17
backdoor (computing)
A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms. Continue Reading
-
August 25, 2017
25
Aug'17
Alleged Sakula malware attacker arrested by FBI
The FBI arrested Chinese national Yu Pingan for alleged involvement with cyberattacks using the Sakula malware, the same malware reportedly used in the OPM breach. Continue Reading
-
August 25, 2017
25
Aug'17
U.S. government cybersecurity is a mess, according to officials
News roundup: John McCain, NIAC and others called out the administration for not doing enough on U.S. government cybersecurity. Plus, the Ropemaker exploit alters emails, and more. Continue Reading
-
August 25, 2017
25
Aug'17
Learn what network access control systems can do for you
Network access control systems keep rogue or compromised devices off of corporate networks. See how they work and the other security technologies with which they work. Continue Reading
-
August 25, 2017
25
Aug'17
How is cross-platform malware carried in Word docs?
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks work and how to defend against them. Continue Reading
-
August 24, 2017
24
Aug'17
Google Chrome Enterprise adds management options
The Google Chrome Enterprise offering officially allows organizations to manage Google Play Store apps, extensions, Microsoft Active Directory and integrate VMware on Chromebooks. Continue Reading
-
August 24, 2017
24
Aug'17
Cryptography attacks: The ABCs of ciphertext exploits
Encryption is used to protect data from peeping eyes, making cryptographic systems an attractive target for attackers. Here are 18 types of cryptography attacks to watch out for. Continue Reading
-
August 24, 2017
24
Aug'17
ATMitch malware: Can fileless ATM malware be stopped?
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it spreads. Continue Reading
-
August 24, 2017
24
Aug'17
The difference between security assessments and security audits
Security audits vs. security assessments solve different needs. Organizations may use security audits to check their security stature while security assessments might be the better tool to use. Expert Ernie Hayden explains the differences. Continue Reading
-
August 23, 2017
23
Aug'17
Project Treble is another attempt at faster Android updates
Google has historically had a problem with getting mobile device manufacturers to push out Android updates, which has left hundreds of millions in the Android ecosystem at risk. Google hopes that ... Continue Reading