CDSA News Headlines

 

Weekend Vulnerability and Patch Report, Mar. 15, 2020 (SecureTheVillage)

Important Security Updates Dropbox: Dropbox has released version 92.4.382 for its file hosting program. Updates are available at Dropbox’s website. Evernote: Evernote has r... More

Addressing Security Holes to Protect Valuable Content (NAGRA Blog)

In today’s M&E industry, to remain competitive, you must stay on your toes when it comes to innovation and evolution. From pay-TV operators to broadcasters and content owners, th... More

In 2020, IoT Security Must Be Part of Your Threat Management Strategy (Security Intelligence)

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or ... More

Gen Z Leading a New Wave of Internet Piracy (Motherboard)

Between Netflix, Hulu, and Disney+, it seemed like streaming giants might have finally won. Gen Z is proving that piracy will never die.... More

Dump Your Passwords, Improve Your Security – Really (CNET)

Passwords suck. They're hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. ... More

Q&A: IBM Security Targets Cybercrime Threat (MWL)

Martin Borrett, distinguished engineer and CTO, IBM Security Europe, discusses the steps the company is taking to ensure the security of its partners and customers in the next-gene... More

Winning in the New Era of Digital Regulation (CPO)

The pace and complexity of regulatory requirements continues to grow globally, with no sign of slowing. For businesses, the challenges are not just that new regulations are being p... More

Staying Resilient: Is Cybersecurity a Burden to Agile Development? (TWA)

Cybersecurity challenges are nothing new to organizations that are pretty far ahead in their digital journey. Various initiatives and technology solutions have allowed organization... More

The Rise of Cybersecurity Product Sprawl (DXC Technology Blog)

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one... More

How India is Building an Ecosystem Around Cybersecurity (Analytics India)

In light of the burgeoning digital sector in India, ambitious plans for quick transformation and rapid growth, the role of IT infrastructure is critical. At the same time, it needs... More

Weekend Vulnerability and Patch Report, Mar. 8, 2020 (SecureTheVillage)

Important Security Updates Piriform CCleaner: Piriform has released version 5.64.7613 for CCleaner. Updates are available from Piriform’s website. Spotify: Spotify has rele... More

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More

Hacking Victims are Uncovering Cyberattacks Faster – and GDPR is the Reason Why (ZDNet)

The amount of time hackers spend inside the networks of compromised organisations before being uncovered has massively declined across Europe -- and GDPR is a key reason for the dr... More

IFPI Forces Closure of Site That Sold ‘Fake’ Plays on Spotify, YouTube (Billboard)

A legal injunction has been placed against one of Europe's leading "fake stream" sites, ordering it to close. The order was filed against Followerschmiede.de in the Berlin District... More

We Need More Than Security Awareness to Combat Insider Threats (SecurityIntelligence)

There are plenty who would say that issues around malware and similar threats are due to people being stubborn, lazy or ignorant of how much damage a security incident can cause. M... More

Warning Over ‘Hidden Apps’ as Mobile Malware Attacks Increase – and Get Sneakier (ZDNet)

Mobile malware attacks are becoming more common as cyber criminals increasingly turn their attention towards smartphones – and they're ensuring that malicious activity is harder ... More

Why Threat Intelligence Gathering Can Be a Legal Minefield (Dark Reading)

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground on... More

Cisco, Microsoft Team to Control Growing IoT Networks (NW)

Cisco will meld its recently released Intelligent Edge software with Microsoft’s Azure IoT Hub to make transferring data from edge devices to applications in the Azure cloud simp... More

Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)

Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More

AI Gives Web Hosting Industry Crucial Edge Over Cyber Criminals (SDC)

The web hosting industry has undergone a tremendous transformation in recent years. One of the biggest trends is the growing reliance on artificial intelligence. AI has helped web ... More

Sign up for our newsletters
* indicates required
MESA Newsletters