CyberRX: Healthcare industry’s first cyber attack simulation
HITRUST, in coordination with the U.S. Department of Health and Human Services (DHHS), revealed the results of the healthcare industry’s first cyber attack simulation, …
Week in review: SATCOM (in)security, Heartbleed fallout, and the security of programming languages
Here’s an overview of some of last week’s most interesting news and articles: Appeals court overturns AT&T hacker’s sentence Andrew “weev” …
Cross Match acquires DigitalPersona
Cross Match Holdings and DigitalPersona announced a merger agreement that will combine the two companies. With more than 300 employees, a network of partners and millions of …
Beware of clever phishing scam that bypasses Steam Guard
Malwarebytes’ Chris Boyd is warning owners of Steam accounts about a relatively new phishing approach that goes after both their account login credentials and a file …
Organizations remain vulnerable to SQL injection attacks
Privacy and information security research firm Ponemon Institute, along with DB Networks, an innovator of behavioral analysis in database security, today announced the results …
3M payment cards compromised in Michaels Stores/Aaron Brothers breach
In the wake of the highly publicized Target and Neiman Marcus breaches, Texas-based arts and crafts store chain Michaels has stated in January that it has been targeted by …
Understanding risk is a top security concern
The biggest challenge for organizations is prioritizing, understanding and addressing vulnerabilities in a business context, according to an AlgoSec survey conducted during …
Security pros largely unhappy with compliance methods
Despite the fact that 63% consider regulatory compliance to be “very important”, a new Osterman study shows a low satisfaction level with current methods of …
ESET launches secure authentication SDK
ESET launched the ESET Secure Authentication Software Development Kit (SDK). With this release, ESET provides system architects with a comprehensive developer guide in three …
The dismal state of SATCOM security
Satellite Communications (SATCOM) play a vital role in the global telecommunications system, but the security of the devices used leaves much to be desired, says Ruben …
Tor relays vulnerable to Heartbleed dropped from anonymity network
Thanks to the OpenSSL Heartbleed bug, the Tor anonymity network is set to temporarily lose around “12 per cent of the exit capacity and 12 per cent of the guard …
Attackers use reflection techniques for larger DDoS attacks
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in favor of reflection and amplification …
Featured news
Sponsored
Don't miss
- Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
- How passkeys eliminate password management headaches
- Delta vs. CrowdStrike: The duties vendors owe to customers – or do they?
- IntelOwl: Open-source threat intelligence management
- Current attacks, targets, and other threat landscape trends