Social media security is still a low priority
80 percent of IT professionals believe social media is an easy way for hackers to gain access to corporate networks because it is often neglected in terms of security, and …
Entrust Datacard integrates with Citrix to enable secure anytime-anywhere productivity
Entrust Datacard is debuting new integrations with XenMobile, an enterprise mobility management (EMM) solution developed by Citrix, to provide a trusted mobile identity to …
Antiquated environment and bad security practices aided OPM hackers
By now, you’ve all heard about the massive breach at the US Office of Personnel Management’s (OPM), and that the attackers have accessed (and likely made off with) …
Most vulnerabilities on enterprise networks are two years old
The NTT Innovation Institute and NTT Group security combined an analysis of over six billion attacks observed in 2014 with an interactive data review and ongoing daily global …
Brain’s reaction to certain words could replace passwords
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words …
NIST updates ICS security guide
The National Institute of Standards and Technology (NIST) has issued the second revision to its Guide to Industrial Control Systems (ICS) Security. It includes new guidance on …
Released: New version of REMnux Linux distro for malware analysis
REMnux is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident …
Week in review: Hiding exploit code in images, online summer travel scams, and Infosecurity Europe 2015
Here’s an overview of some of last week’s most interesting news and articles:Cookie warnings: Useless and bad for security?Our daily clicking away of these …
MalumPoS can be customized to target different systems
“A new Point-of-Sale RAM scraper is being offered for sale, and is currently designed to collect data from a very specific type of PoS systems: those running on Oracle …
Personal info of 4 million US government workers compromised in OPM breach
Approximately 4 million US federal employees, both current and former, will start receiving a breach notification alerting them that their personal information has potentially …
Stagnant budgets and rising insider security threats
A Vectra Networks survey of more than 500 cybersecurity professionals in the Information Security Community on LinkedIn reveals that insider threats are rising, but IT …
Online summer travel scams to watch out for
Iovation released a list of common online summer travel scams to watch out for. The company also announced that it has seen a hundred percent increase in online travel …
Featured news
Resources
Don't miss
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security
- Enterprise password audits made practical for busy security teams
- What zero trust looks like when you build it step by step
- Social data puts user passwords at risk in unexpected ways