Advertisements


Enterprise cloud adoption and IaaS security

Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service (IaaS). Survey results Respondents included IT professionals across small, medi.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2017Related News

Is your router sending out spam?

A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor Web virus analysts first documented Linux.ProxyM back in February 2017, an.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2017Related News

Spoofed IRS notice delivers RAT through link updating trick

The malware delivery trick involving updating links in Word documents is apparently gaining some traction: the latest campaign to use it likely takes the form of fake emails from the Internal Revenue Service (IRS). The fake email includes an attachme.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2017Related News

New infosec products of the week​: September 22, 2017

Cyber-defense for critical infrastructure including factories, plants, utilities & hospitals NTT Security has launched IT/OT Integrated Security Services, delivered via a combination of both Consulting Services (CS) and Managed Security Services (MSS.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2017Related News

46,000 new phishing sites are created every day

An average of 1.385 million new, unique phishing sites are created each month, with a high of 2.3 million sites created in May. The data collected by Webroot shows today’s phishing attacks are highly targeted, sophisticated, hard to detect, and dif.....»»

Source:  NetsecurityCategory: SecuritySep 22nd, 2017Related News

Equifax directed consumers to fake phishing site for weeks

You can now add another blunder to the already long list of Equifax’s missteps in the wake of the massive breach it announced earlier this month: the company has been pointing affected customers to a fake phishing site. In a series of tweets pu.....»»

Source:  NetsecurityCategory: SecuritySep 21st, 2017Related News

Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco

There is a new twist in the CCleaner hack saga: the attackers apparently didn’t set out to compromise as many machines as possible. A covert, highly targeted attack According to Cisco, their actual targets were computers at a number of huge tec.....»»

Source:  NetsecurityCategory: SecuritySep 21st, 2017Related News

Three things to know about the dark web

One of the more curious aspects about the dark web is that it didn’t start out as such a dark place: it began with bulletin boards in the 80s and 90s – the markets of that day – and continued in the early 2000s, when Freenet launched as.....»»

Source:  NetsecurityCategory: SecuritySep 21st, 2017Related News

Legacy networks holding back cloud and digital transformation

A new global survey by Riverbed Technology, which includes responses from 1,000 IT decision makers across nine countries, revealed an incredible level of agreement that legacy infrastructures are holding back their cloud and digital strategies. Nearl.....»»

Source:  NetsecurityCategory: SecuritySep 21st, 2017Related News

Maintaining Windows 10 security tops list of enterprise challenges

Companies are experiencing significant challenges in their attempts to keep their endpoints secure. Maintaining Windows 10 security topped the list of challenges with over half of respondents to an Adaptiva survey indicating it can take a month or mo.....»»

Source:  NetsecurityCategory: SecuritySep 21st, 2017Related News

Optionsbleed bug makes Apache HTTP Server leak data from memory

On Monday, security researcher Hanno Böck detailed a memory-leaking vulnerability in Apache HTTP Server that’s similar to the infamous OpenSSL Heartbleed bug uncovered in April 2014. Unlike Heartbleed, Optionsbleed (as Böck dubbed it) affects.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

Using security cameras and infrared light to extract data from air-gapped networks

Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light capabilities of (indoor and outdoor) security cameras connected to it. Infrared.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

Setting the standard for a blockchain protocol for IoT

A wide range of blockchain technology companies and enterprises like Cisco, Gemalto and Bosch have launched the Trusted IoT Alliance, an initiative that aims to bring companies together to develop and set the standard for an open source blockchain pr.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

The evolving nature of the CISO role

As IT security increasingly becomes a priority, CISOs’ influence within companies is growing. However, security strategy in many organizations is still largely reactive and not yet aligned with business functions. Conducted by the Ponemon Institute.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

The three least effective enterprise security measures

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will always be exploitable. Understandably, and in line with recent cyberattacks, ma.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

Number of lost, stolen or compromised records increased by 164%

According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records incre.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

Apple releases iOS 11

Starting yesterday, iPhone and iPad customers around the world can update their devices to iOS 11. While the list of new features and improvements is huge, here are some that Help Net Security readers might be interested in: The all-new Files app pro.....»»

Source:  NetsecurityCategory: SecuritySep 20th, 2017Related News

Google Chrome most resilient against attacks, researchers find

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabil.....»»

Source:  NetsecurityCategory: SecuritySep 19th, 2017Related News

Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach. Password practices The study found that strong passwords and biometrics continue to be an es.....»»

Source:  NetsecurityCategory: SecuritySep 19th, 2017Related News

A clearer picture of the CCleaner backdoor incident

On Monday, Cisco and Piriform – the Avast-owned company behind the popular CCleaner utility – announced that certain versions of the software have been backdoored by hackers. A blog post by security outfit Morphisec later revealed they we.....»»

Source:  NetsecurityCategory: SecuritySep 19th, 2017Related News