HITS returns to New York City on Nov. 8 at the Microsoft Technology Center in Midtown Manhattan with a morning conference program from 9 a.m. to noon. This year’s HITS N.Y.C... More
Tag Archives: Cybersecurity
HBO Chief Security Officer to Keynote HITS N.Y.C.
Why Poor Cyber Hygiene Invites Risk (Dark Reading)
Organizations around the world are implementing mobility, cloud computing, the Internet of Things (IoT), business intelligence, and social media technologies at breakneck speeds in... More
Forget ‘Hackers in Hoodies,’ Cybercriminals are the New Mafia (Wired)
Forget the cliché of lonely figures in hoodies crouched over laptops, feverishly bashing out lines of code. Online crime is a lucrative business, and hackers are the new Mafia. ... More
Spreading the DDoS Disease and Selling the Cure (Krebs on Security)
Earlier this month a hacker released the source code for Mirai, a malware strain that was used to launch a historically large 620 Gbps denial-of-service attack against this si... More
CTA Launches New Cybersecurity Assessment Tool (CTA)
In light of the increasing volume of cyber threats, the Consumer Technology Association (CTA), in partnership with Cigital, has released a new cybersecurity assessment tool for CTA... More
Weekend Vulnerability and Patch Report, Oct. 23, 2016 (Citadel Information Group)
Important Security Updates AVG Free Edition: AVG has released version 2016.121.7859 of its 64 and 32 bit Free Edition. Updates are available on AVG’s website. Foxit Reade... More
Cyber Alliance: Top-Down Approach Needed for Business Cybersecurity
Marking October as National Cyber Security Awareness Month, the National Cyber Security Alliance (NCSA), the U.S. Department of Homeland Security (DHS) and businesses are banding t... More
NSS Labs Shares Intrusion Prevention Test Results
Cybersecurity research and testing firm NSS Labs has announced the results of its Next Generation Intrusion Prevention Systems (NGIPS) group test, examining the security effectiven... More
Questions Every CIO Should Ask the Cybersecurity Leader (IBM)
Over the past several years, the widespread escalation of cybersecurity focus by boards and governments around the globe has increased the visibility, funding, influence and sophis... More
An Information Security Survival Guide (Info Security)
Information security is viewed in some organizations as a function owned by a few individuals or one department. However, with human error continuing to remain the most prominent ... More
Yahoo Breach May Trigger ‘Material Adverse Change’ Clause (Dark Reading)
Verizon Communications may have leverage to renegotiate its $4.8 billion Yahoo acquisition under a rarely used "material adverse change" clause, the Wall Street Journal reported.... More
Boxing Promoter Offers Cash Reward to Identify Pirate Streamer (TorrentFreak)
Every day, content production companies and their anti-piracy partners take a keen interest in people posting their material online without permission. They’re often able to u... More
IoT Devices as Proxies for Cybercrime (Krebs on Security)
Multiple stories published here over the past few weeks have examined the disruptive power of hacked “Internet of Things” (IoT) devices such as routers, IP cameras and digi... More
Companies Should Understand Where Cybercrime Thrives (Harvard Business Review)
As global cybercrime increases, governments and businesses are struggling to keep up with the threats they are facing. Because of the changing and innovative methods of attack bein... More
Europe to Push New Security Rules Amid IoT Mess (Krebs on Security)
The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras,... More
Weekend Vulnerability and Patch Report, Oct. 16, 2016 (Citadel Information Group)
Important Security Updates Adobe Flash Player: Adobe has released version 23.0.0.185 to fix at least 12 vulnerabilities. Updates are available from Adobe’s website. Adobe R... More
PwC Survey: New Tech, Employee Training Top Executive Cybersecurity Lists
Better employee training, advanced authentication in lieu of passwords, and better cybersecurity safeguards with the Interne of Things (IoT) in mind are all on the list for America... More
Apple, Netflix Customers Targeted in Fake Invoice E-Mail Scam (This is Money)
Apple customers are being targeted in a series of new scams involving invoices containing fake iTunes, App Store or Netflix purchases. The bogus emails – likely to have been s... More
5 Security Practices Hackers Say Make Their Lives Harder (CIO)
Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks. Whether... More
Kudelski Security Expands Into U.S. Market to Address Unmet Demand for Advanced Cybersecurity Solutions (MESA)
Kudelski Security, a Swiss-based company, today at Black Hat USA, announced the launch of its U.S. presence to meet growing market demand for cybersecurity solutions and managed se... More