Tag Archives: Cybersecurity

HBO Chief Security Officer to Keynote HITS N.Y.C.

HITS returns to New York City on Nov. 8 at the Microsoft Technology Center in Midtown Manhattan with a morning conference program from 9 a.m. to noon. This year’s HITS N.Y.C... More

Why Poor Cyber Hygiene Invites Risk (Dark Reading)

Organizations around the world are implementing mobility, cloud computing, the Internet of Things (IoT), business intelligence, and social media technologies at breakneck speeds in... More

Forget ‘Hackers in Hoodies,’ Cybercriminals are the New Mafia (Wired)

Forget the cliché of lonely figures in hoodies crouched over laptops, feverishly bashing out lines of code. Online crime is a lucrative business, and hackers are the new Mafia. ... More

Spreading the DDoS Disease and Selling the Cure (Krebs on Security)

Earlier this month a hacker released the source code for Mirai, a malware strain that was used to launch a historically large 620 Gbps denial-of-service attack against this si... More

CTA Launches New Cybersecurity Assessment Tool (CTA)

In light of the increasing volume of cyber threats, the Consumer Technology Association (CTA), in partnership with Cigital, has released a new cybersecurity assessment tool for CTA... More

Weekend Vulnerability and Patch Report, Oct. 23, 2016 (Citadel Information Group)

Important Security Updates AVG Free Edition: AVG has released version 2016.121.7859 of its 64 and 32 bit Free Edition. Updates are available on AVG’s website. Foxit Reade... More

Cyber Alliance: Top-Down Approach Needed for Business Cybersecurity

Marking October as National Cyber Security Awareness Month, the National Cyber Security Alliance (NCSA), the U.S. Department of Homeland Security (DHS) and businesses are banding t... More

NSS Labs Shares Intrusion Prevention Test Results

Cybersecurity research and testing firm NSS Labs has announced the results of its Next Generation Intrusion Prevention Systems (NGIPS) group test, examining the security effectiven... More

Questions Every CIO Should Ask the Cybersecurity Leader (IBM)

Over the past several years, the widespread escalation of cybersecurity focus by boards and governments around the globe has increased the visibility, funding, influence and sophis... More

An Information Security Survival Guide (Info Security)

Information security is viewed in some organizations as a function owned by a few individuals or one department. However, with human error continuing to remain the most prominent ... More

Yahoo Breach May Trigger ‘Material Adverse Change’ Clause (Dark Reading)

Verizon Communications may have leverage to renegotiate its $4.8 billion Yahoo acquisition under a rarely used "material adverse change" clause, the Wall Street Journal reported.... More

Boxing Promoter Offers Cash Reward to Identify Pirate Streamer (TorrentFreak)

Every day, content production companies and their anti-piracy partners take a keen interest in people posting their material online without permission. They’re often able to u... More

IoT Devices as Proxies for Cybercrime (Krebs on Security)

Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digi... More

Companies Should Understand Where Cybercrime Thrives (Harvard Business Review)

As global cybercrime increases, governments and businesses are struggling to keep up with the threats they are facing. Because of the changing and innovative methods of attack bein... More

Europe to Push New Security Rules Amid IoT Mess (Krebs on Security)

The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras,... More

Weekend Vulnerability and Patch Report, Oct. 16, 2016 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 23.0.0.185 to fix at least 12 vulnerabilities. Updates are available from Adobe’s website. Adobe R... More

PwC Survey: New Tech, Employee Training Top Executive Cybersecurity Lists

Better employee training, advanced authentication in lieu of passwords, and better cybersecurity safeguards with the Interne of Things (IoT) in mind are all on the list for America... More

Apple, Netflix Customers Targeted in Fake Invoice E-Mail Scam (This is Money)

Apple customers are being targeted in a series of new scams involving invoices containing fake iTunes, App Store or Netflix purchases. The bogus emails – likely to have been s... More

5 Security Practices Hackers Say Make Their Lives Harder (CIO)

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks. Whether... More

Kudelski Security Expands Into U.S. Market to Address Unmet Demand for Advanced Cybersecurity Solutions (MESA)

Kudelski Security, a Swiss-based company, today at Black Hat USA, announced the launch of its U.S. presence to meet growing market demand for cybersecurity solutions and managed se... More