Would you enjoy If Drones hovering outside your window or above your head, just because it is offering High-Speed Internet Service? Most Americans may simply prefer to "Shoot Down" unwelcome items. Well, Google is working on a similar secret [...]
Monday, February 29, 2016
The World of Unknowns and the First Responder
The World of Unknowns and the First Responder: When it comes to known unknowns, there one fact you can be sure of – which is based on the conundrum of “am I being, or have I been hacked?”
DB Networks Honored as Best Data Center Security Solution for 2016 in 4th Annual Cyber Defense Magazine InfoSec Awards
http://www.prnewswire.com/news-releases/db-networks-honored-as-best-data-center-security-solution-for-2016-in-4th-annual-cyber-defense-magazine-infosec-awards-300227624.html
DB Networks Award-Winning Layer 7 Database Sensor Delivering Database Protection and Deep Visibility into Database Infrastructure will be Featured at RSA Conference 2016.
After many months of review and judged by leading independent information security experts, Cyber Defense Magazine selected DB Networks as a winner for its new Layer 7 Database Sensor solution. [....]
Cyber Defense Magazine Names Indegy Best Next Gen ICS/SCADA Security Solution for 2016 | Business Wire
Cyber Defense Magazine Names Indegy Best Next Gen ICS/SCADA Security Solution for 2016 | Business Wire
“Since we only recently emerged from stealth, we are very honored to be recognized with the Cyber Defense Magazine Award for Best ICS/SCADA Security Solution,” said Barak Perelman, CEO of Indegy.
“Since we only recently emerged from stealth, we are very honored to be recognized with the Cyber Defense Magazine Award for Best ICS/SCADA Security Solution,” said Barak Perelman, CEO of Indegy.
Sunday, February 28, 2016
Saturday, February 27, 2016
How To Keep Your Android Phone Secure
How To Keep Your Android Phone Secure
As the number of threats is on the rise, Android platform is no longer safe, which isn't a surprise to anyone.
Most of us are usually worried more about the security of our desktops or laptops and forget to think about the consequences our smartphones can make if compromised or stolen.[...]
Thursday, February 25, 2016
Tuesday, February 23, 2016
GM Bot (Android Malware) Source Code Leaked Online
GM Bot (Android Malware) Source Code Leaked Online
The source code of a recently discovered Android banking Trojan that has the capability to gain administrator access on your smartphone and completely erase your phone's storage has been LEAKED online.[....]
The source code of a recently discovered Android banking Trojan that has the capability to gain administrator access on your smartphone and completely erase your phone's storage has been LEAKED online.[....]
Monday, February 22, 2016
Sunday, February 21, 2016
Saturday, February 20, 2016
Greater visibility into how cybersecurity programmes are performing
Greater visibility into how cybersecurity programmes are performing: As attacks grow, CEOs and boards are increasingly being held accountable.
Keeping your bank account safe is tough against modern bank robbers
Keeping your bank account safe is tough against modern bank robbers: Many of today’s robberies are conducted from behind computer screens
Friday, February 19, 2016
How Just Opening an MS Word Doc Can Hijack Every File On Your System
How Just Opening an MS Word Doc Can Hijack Every File On Your System
If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it.
Doing so could cripple your system and could lead to a catastrophic destruction.
Thursday, February 18, 2016
How To Convince Management You Need More People
CISOs stand a better chance of getting the resources they need if they establish proper performance metrics that show how information security supports and benefits business objectives and opportunities.[...] http://www.darkreading.com/careers-and-people/how-to-convince-management-you-need-more-people/d/d-id/1323803 via @DarkReading
Wednesday, February 17, 2016
Managing information security risks
Managing information security risks: Information security has always been important in the Oil & Gas sector but has not been given as much attention as political, safety, and environm...
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom: Cybersecurity incidents have significant impact beyond the IT organization, representing a significant risk to ongoing business continuity and reputation, and requiring heightened engagement across the entire executive team. Common wisdom is that security leaders need to speak in ways the business will understand, but what does that really mean? And how does the business side …
Tuesday, February 16, 2016
Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry | news.sys-con.com
Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry | news.sys-con.com.
Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry
Recent Recognition in Forbes and Recipient of Three Awards in 2016 Validate Code Dx as a Cybersecurity Industry Innovator and Leader
European Commission - PRESS RELEASES - Press release - Security of gas supply regulation
European Commission - PRESS RELEASES - Press release - Security of gas supply regulation: European Commission - PRESS RELEASES - Press release - Security of gas supply regulation
Survey Finds Lack of Consensus on Cybersecurity Accountability
Survey Finds Lack of Consensus on Cybersecurity Accountability: To provide an accurate view of risk, companies should introduce pre-emptive and real-time methods such as monitoring all the traffic in its network
Research: Attackers Drained $103,000 Out of Bitcoin Wallets Protected by Passwords
Research: Attackers Drained $103,000 Out of Bitcoin Wallets Protected by Passwords: Research reveals that attackers exploited a vulnerability that allowed them to drain $103,000 out of password-protected Bitcoin wallets.
Security researcher Ryan Castellucci first presented on the vulnerability at DEF CON,one of Tripwire’s top 10 conferences in information security.[...]
Security researcher Ryan Castellucci first presented on the vulnerability at DEF CON,one of Tripwire’s top 10 conferences in information security.[...]
Monday, February 15, 2016
Phishing Email Scam Targeting Airbnb Customers
Phishing Email Scam Targeting Airbnb Customers: Security researchers have identified a new phishing scam that is targeting customers of the popular accommodation booking site Airbnb.
Sunday, February 14, 2016
How Hospitals Are Working to Stop Data Thieves
How Hospitals Are Working to Stop Data Thieves: 2015 was the year of the health care security breach. Nearly 100 million electronic health records were compromised, according to a December 2015 IBM Security report, blowing away the number of data breaches that occurred in the computer services and financial sectors.
Saturday, February 13, 2016
Friday, February 12, 2016
Six cybersecurity measures companies can't ignore in 2016
Six cybersecurity measures companies can't ignore in 2016: Business in the digital age means doing less on paper and more in cyberspace. Many can access work-related documents from anywhere whether it’s a mobile device or an actual desktop.
Wednesday, February 10, 2016
Monday, February 8, 2016
Why You Should Be Concerned About The Cybersecurity Information Sharing Act.
Why You Should Be Concerned About The Cybersecurity Information Sharing Act. I really do wish I understood why lawmakers seem so gung-ho on tearing apart technologies they don’t understand, and freedoms they hardly think about.[....]
The InfoSecond: Week Feb 7, 2016
The InfoSecond: Week Feb 7, 2016: Mobile security, drones and eagles. This week's InfoSecond examines the latest mobile security news and then looks to the skies for some developing trends
Sunday, February 7, 2016
NERC CIP Audits: Top 10 Common Mistakes
NERC CIP Audits: Top 10 Common Mistakes: One of the many roles I had while at NERC was as a compliance program auditor for NERC CIP audits and compliance investigations.
How We Can Turn the Tide on Cyber Security in 2016
How We Can Turn the Tide on Cyber Security in 2016: By any measurement, 2015 was another bad year for the world in terms of Cybersecurity.
How the Industrial Internet Marks a More Secure Phase in Protecting SCADA Systems
How the Industrial Internet Marks a More Secure Phase in Protecting SCADA Systems: If air gaps are a thing of the past, how are system administrators and control engineers supposed to protect modern SCADA systems?
Friday, February 5, 2016
Cybersecurity much more than a compliance exercise
How Hospitals Are Working to Stop Data Thieves
How Hospitals Are Working to Stop Data Thieves: 2015 was the year of the health care security breach. Nearly 100 million electronic health records were compromised, according to a December 2015 IBM Security report, blowing away the number of data breaches that occurred in the computer services and financial sectors.
Thursday, February 4, 2016
Managing Security Vulnerabilities and Risks
Managing Security Vulnerabilities and Risks: One of the best ways to deal with vulnerabilities is to look at them in context, but you need security tools that can provide that context first.
Cyber Risks: Three Areas of Concern for 2016
Cyber Risks: Three Areas of Concern for 2016: There are three areas of cyber risk that may be prevalent in 2016: board involvement and management, security budgets and security staff.
A Strategy Map for Security Leaders: Critical Capabilities for the New-School CISO
A Strategy Map for Security Leaders: Critical Capabilities for the New-School CISO: The strategy map for security leaders highlights the critical capabilities today's CISOs should have, ranging from technical prowess to people skills.
Latest Windows 10 May Have a Linux Subsystem Hidden Inside
eBay refuses to patch website flaw that can serve up malware
The e-commerce giant confirmed it would not fix the flaw, which could allow an attacker to remotely run code in a user's browser.
eBay will not fix a flaw in its website that could allow an attacker to serve malware to unsuspecting site users.
Russian Security Council official said that Russia’s new National Information Security Doctrine will be completed in 2016.
Russian Security Council official said that Russia’s new National Information Security Doctrine will be completed in 2016.
Read more: http://sputniknews.com/russia/20160204/1034195710/russia-information-security-doctrine.html#ixzz3zCkDddpf
Read more: http://sputniknews.com/russia/20160204/1034195710/russia-information-security-doctrine.html#ixzz3zCkDddpf
Monday, February 1, 2016
Perspective: What Will Be the Defining Cybersecurity Issues In 2016?
As data breaches and their related obligations and liability risks continue to pile up with every passing year, we asked attorneys writing on JD Supra to answer the question: What will be among the defining issues for cybersecurity in 2016?[.....]
Dutch Police Training Eagles to Take Down Rogue Drones
Facebook XSS could have allowed attackers to take over users’ accounts
Subscribe to:
Comments (Atom)
LinkedIn users targeted by hacking group
LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE
-
Python skills are incredibly useful for all kinds of information security personnel, from pen testers to cyber defenders to forensics pros...
-
All Versions of Windows affected by Critical Security Vulnerability
-
The non-profit organization behind TOR – the largest online anonymity network that allows people to ...



