CDSA News

 

Perk Potential: Could Identity Theft Protection Become a Workplace Benefit? (Business.com)

Whether it’s credit card fraud, social media hijacking or corporate database breaches, identity theft is at the forefront of the threat matrix that law enforcement in the United ... More

Mysterious Spike in WordPress Hacks Silently Delivers Ransomware (ARS Technica)

It's still not clear how, but a disproportionately large number of websites that run on the WordPress content management system are being hacked to deliver crypto ransomware and ot... More

Here’s How To Protect Against A Ransomware Attack (Dark Reading)

Ransomware attacks -- where online extortionists encrypt data on a victim’s computer and then demand a fee for unlocking it -- started off mainly as a consumer problem but increa... More

Google Declares War Against Deceptive Download Buttons (Help Net Security)

There's likely no Internet user that hasn't, at some point, been tricked into clicking on a deceptive "download," "install," or "update" button. They are usually shown via ads, mi... More

Good Riddance to Oracle’s Java Plugin (Krebs on Security)

Good news: Oracle says the next major version of its Java software will no longer plug directly into the user’s Web browser. This long overdue step should cut down dramatica... More

CSI: Cyber-Attack Scene Investigation: A Malware Whodunit (Scientific American)

Cyber attacks against government agencies, infrastructure providers and other high-profile targets are regularly in the news, stirring talk of digital warfare and international sa... More

Safe Harbor Data Gets a New ‘Privacy Shield’ (Arent Fox)

The European Commission and U.S. Department of Commerce have agreed on a Safe Harbor replacement deal, rebranded as the EU-US Privacy Shield. The deal was first announced via Twi... More

Weekend Vulnerability and Patch Report, February 7, 2016 (Citadel Information Group)

Important Security Updates Avast: Avast! Free Antivirus has released version 11.1.2253. Updates are available on Avast’s website. Google Chrome: Google has released Google C... More

Compromised Enterprise Networks Fuel 236% Increase in Viruses, Worms (Help Net Security)

Solutionary performed a broad analysis of the threat landscape, which uncovered several key findings. One of the most compelling finding links the rapid growth (236 percent) in vir... More

27% of all Malware Variants in History were Created in 2015 (CSO Online)

Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected over the course of the year. That ... More

Two-Thirds of Android Users Vulnerable to Web History Sniff Ransomware (The Register)

Miscreants have put together an especially pernicious strain of Android ransomware that threatens to bare your browsing history. The so-called Lockdroid ransomware brandishes ov... More

Consumers are Increasingly Concerned About Privacy and They’re Acting on it (Help Net Security)

More Americans are concerned about not knowing how the personal information collected about them online is used than losing their principal source of income. A new study by TRUSTe... More

The Computer Virus that Blackmails You (BBC)

Ransomware is the fastest growing form of computer malware, experts warn. It's a malicious virus that locks the user out of their computer and demands a fee to return their files.... More

Weekend Vulnerability and Patch Report, January 31, 2016 (Citadel Information Group)

Important Security Updates Apple tvOS: Apple has released version 9.1.1 for Apple TV (4th generation) to fix at least 7 vulnerabilities, some of which are highly critical, report... More

How Hollywood Is Using the Streaming Boom to Beat Back Digital Pirates (The Wrap)

With streaming giants Netflix, Amazon and Hulu owning more and more of the home entertainment market, along with PlayStation, iPhones, Google Play and scores of other online platfo... More

Venture Capitalists Chase Rising Cybersecurity Spending (MIT Technology Review)

The rash of headline-grabbing cyber­attacks on major companies over the past few years has made one thing abundantly clear: it’s not enough to rely only on traditional security ... More

Secret SSH Backdoor in Fortinet Hardware Found in More Products (Ars Technica)

A recently identified backdoor in hardware sold by security company Fortinet has been found in several new products, many that were running current software, the company warned thi... More

A Strategy Map for Security Leaders: Information Security’s Value to the Organization (Security Intelligence)

The first row of our strategy map for security leaders is about the question that security professionals seem to struggle with the most: What value do you provide? Part of the pro... More

The Apple App Store Incident: Trouble in Paradise? (Dark Reading)

Apple’s App Store and development ecosystem is often described as a walled garden, due to its closed developer ecosystem and stringent security. Since 2008, Apple’s approach ha... More

Oracle Releases a Record 248 Patches (Computer World)

Oracle admins will be busy: The company issued 248 patches on Tuesday, its largest-ever release, according to one security vendor. Five of the vulnerabilities have the highest sev... More

Sign up for our newsletters
* indicates required
MESA Newsletters