Sign up for our weekly newsletter!
REGISTER NOW
Blogs
Latest Most Commented Content
Page 1 / 2   >   >>
Ted Schlein Hates Passwords
Curt Franklin  
10/27/2017   64 comments
He hates user names, too, and thinks we should get rid of them. In a keynote address at Networking the Future in Tampa, Fla., he discussed why.
Lessons Learned From 2018 Security Breaches
Marzena Fuller  
2/14/2019   63 comments
It's better to hear about a data breach internally than by a security researcher who happens to discover a publicly exposed asset or confidential data for sale on a dark web.
Friday Haiku: A Shopping Chill
Curt Franklin  
11/17/2017   62 comments
A cautionary note for the season in this week's Friday Haiku.
IoT Device Adoption Hampered by Consumer's Security Concerns
Larry Loeb  
10/26/2018   53 comments
For companies looking to jump on the IoT bandwagon, the adoption of these devices is being slowed by consumers' concerns over safety and security, a new report finds.
Facebook Exposes Millions of Unencrypted User Passwords
Larry Loeb  
3/22/2019   53 comments
It's an internal matter – but it could affect millions of the social network's users.
IoT Use Complicates Security Landscape in Healthcare
Simon Marshall  
3/19/2018   49 comments
As billions of IoT devices are coming online, especially in healthcare, the security landscape is getting increasingly complicated, according to a report from Zingbox.
Microsoft Outlook Backdoor Amped Up by Russia-Linked Group
Larry Loeb  
8/28/2018   42 comments
The Russia-linked Turla group uses PDF attachments to email messages to exfiltrate data, according to ESET.
Friday Haiku: No Safety in Bluetooth
Curt Franklin  
9/15/2017   42 comments
Bluetooth's vulnerability might be the biggest security story of the year.
Researcher Finds Way to Bypass SOP Within Microsoft Edge Browser
Larry Loeb  
8/3/2018   41 comments
For years, SOP has made sure that browsing stays safe by isolating different websites. Now, a researcher found a way around the protocol within Microsoft's Edge browser.
Three Reasons Facial Recognition Will Win
Curt Franklin  
9/27/2017   40 comments
Facial recognition technology is coming to a device near you. Here are three reasons it's inevitable.
Almost 1 Billion Emails With Personal Information Left Unsecured
Larry Loeb  
4/1/2019   40 comments
As leaks go, it's a whopper, and a so-called email validation service provider is to blame.
Yahoo Breach News Just Gets Worse
Curt Franklin  
10/4/2017   36 comments
It turns out that more than 3 billion accounts were compromised in the Yahoo breach originally disclosed last year.
Security Executives Respond to Uber Breach News
Curt Franklin  
11/22/2017   36 comments
The news from Uber is rippling across the business landscape. Executives and leaders have a variety of responses to the breach and its aftermath. Here's a roundup of some of those reactions.
Android Banking Trojan 'Gustuff' Becomes More Dangerous
Larry Loeb  
3/29/2019   35 comments
New report puts Gustuff into the same threat tier as Anubis, Red Alert, Exobot, LokiBot and BankBot.
Facebook Privacy Policy Is Under Investigation by FTC
Dawn Kawamoto  
3/27/2018   33 comments
Federal Trade Commission reveals it is conducting an open investigation into Facebook's privacy practices, as news reports surface about the social media giant collecting phone call and text message data on its users.
VPNs Are Still Leaking Your Personal Information
Larry Loeb  
3/30/2018   33 comments
While VPNs are supposed to allow for safe, anonymous browsing, it turns out that STUN servers on the backend can still leak personal information and your whereabouts. Here's how to minimize that.
Majority of Healthcare Companies Suffer a Data Breach
Dawn Kawamoto  
3/6/2018   32 comments
As healthcare organizations embrace new forms of digital technology, the percentage of these organizations that have reported a previous security breach is now at a record high, a new report finds.
Ten Cybersecurity Predictions That I Don't Like for 2019
Alan Zeichick  
1/1/2019   32 comments
If 2018 turned into a security headache for enterprises, our writers predicts that 2019 won't be much better – maybe even worse.
RouteX Hijacks Netgear Routers
Larry Loeb  
9/18/2017   30 comments
Malware called RouteX can give an attacker control of popular wireless routers.
WordPress Zero-Day Vulnerability Found in 'Social Warfare' Plugin
Larry Loeb  
3/26/2019   29 comments
'Social Warfare' was open to attacks through use of a stored Cross-Site Scripting (XSS) vulnerability that was introduced with the latest change made to the plugin (3.5.2).
12 Cloud Backup Tips to Protect Your Business's Back-End Servers
Alan Zeichick  
11/27/2018   28 comments
The cloud can offer cost-effective backups for enterprise web servers, file servers and other critical infrastructure. Here are a dozen tips on how to make cloud backups safe and efficient.
How to Access the Voter Information Dirt Cambridge Analytica Has on You
Dawn Kawamoto  
3/20/2018   28 comments
UK-based Cambridge Analytica and its parent company are embroiled in controversy after amassing Facebook data on 270,000 users to influence election outcomes. Here's how to find out the dirt they have on you.
Memcache Servers Being Used to Launch Massive DDoS Attacks
Larry Loeb  
3/1/2018   28 comments
Several reports over the last few days are finding that someone is using Memcache servers to launch massive DDoS attacks.
Increased Permissions in Mobile Apps Increases Potential Risk
Larry Loeb  
4/4/2019   27 comments
App user permissions should be justified, but many of them aren't.
Public Cloud, Part of the Network or Not, Remains a Security Concern
Alan Zeichick  
5/30/2018   27 comments
Security in the public cloud is like asking who is responsible for securing your rented apartment – you or the building owner?
Friday Haiku: Fear the Zombie Server
Curt Franklin  
8/25/2017   26 comments
DDoS attacks are lurking in armies of zombie servers.
Sophisticated Malvertising Campaign Involves 10,000 WordPress Sites
Larry Loeb  
8/1/2018   25 comments
A CheckPoint study has uncovered a complex malvertising schemes that involves more than 10,000 WordPress-hosted sites, and an ecosystem of ad-networks and resellers.
Four Enterprise Identity & Access Management Trends to Watch in 2019
Alan Zeichick  
1/25/2019   25 comments
For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.
Cryptomining: Paying the Price for Cryptocurrency
Simon Marshall  
1/30/2018   25 comments
The growing popularity of Bitcoin and other cryptocurrency has led to cryptomining, with enterprises and individuals running the software unknowingly. Here's a look at the underside of this new business model.
Attack Code 'MarioNet' Is Pulling Strings in Your Web Browser
Larry Loeb  
2/28/2019   24 comments
JavaScript APIs have stretched the boundaries of what is run in the browser to enable feature-rich web applications. But this comes at a price...
Data Leaks Via Smart Light Bulbs? Believe It
Larry Loeb  
8/29/2018   24 comments
Researchers from the University of Texas at San Antonio have shown it's possible to exfiltrate data from a smart-bulb system. But there's no need to go back to candles just yet.
Google, Firefox Pull Stylish After Report Shows How Data Is Collected
Larry Loeb  
7/6/2018   23 comments
A security researcher showed how the Stylish browser extension sent personal data and search results back to the parent company, and this forced Mozilla and Google to yank it off their stores.
Millions of Email Addresses Exposed in Latest Malware Database
Curt Franklin  
8/30/2017   23 comments
A database housed in the Netherlands is found to contain hundreds of millions of hacked email addresses.
Equifax Breach Won't Be the Last or Worst
Curt Franklin  
9/13/2017   22 comments
The Equifax breach shows that a major change in personal records is required, according to a senior Gartner analyst.
CAPTCHA Is Vulnerable
Larry Loeb  
10/30/2017   22 comments
A group of researchers have demonstrated a vulnerability in the widely used CAPTCHA scheme – a vulnerability that may mean the end of CAPTCHA as we know it.
Security Spending Increasing, Along With Data Breaches
Larry Loeb  
1/29/2018   22 comments
In one of those good news/bad news reports on the state of security, the amount of money being spent on security is expected to increase this year, but the number of data breaches is also rising.
SOP Story: Why Protecting Web Browsers Remains a Security Cornerstone
Larry Loeb  
12/24/2018   22 comments
One of the oldest ways to protect content on the web is SOP. However, it's not always implemented in the same way on all browsers. This can complicate one of the main cornerstones of Internet security.
Managed Security Service Providers: Good Idea, but What's the Catch?
Alan Zeichick  
10/25/2018   22 comments
Managed security service providers are a good idea for businesses struggling with creating their own InfoSec division. However, there are some drawbacks to consider.
Endpoint-Security Companies in High Demand for Buyouts, Partnerships
Joe Stanganelli  
2/28/2019   21 comments
Since last year, endpoint-protection firms have been among the biggest movers and shakers in the cybersecurity realm – with the endpoint-security market seeing more than a typical share of acquisitions and strategic partnerships. Joe Stanganelli takes a look at why this might be happening.
'Steganography' Obsfucation Hides Old PDF Exploits From Antivirus Tools
Larry Loeb  
1/28/2019   20 comments
EdgeSpot has found two new obsfucation methods to hide old PDF exploits from various antivirus tools.
AI Is Stealing These IT Security Jobs – Now
Dawn Kawamoto  
3/20/2018   20 comments
Besides the current crop of jobs AI is stealing, other InfoSec roles are also potentially next unless professionals safeguard their careers by repositioning their skills, say IT security and careers experts.
IoT Security Concerns Include Pet Trackers, Kaspersky Finds
Jeffrey Burt  
5/24/2018   20 comments
Kaspersky Lab researchers found BLE and weaknesses in the Android apps running on pet trackers can enable attackers to access user data from the IoT devices.
Carbon Black: Cyber Attacks Could Jump 60% During Holidays
Jeffrey Burt  
11/26/2018   20 comments
Spear-phishing campaigns are the most common form of attack as shoppers go to the stores and online and employees hit the road, according to a survey from Carbon Black.
Google, Roku, Sonus Rush Out Patches for DNS Vulnerability
Larry Loeb  
6/22/2018   20 comments
DNS rebinding might be ancient in security terms, but it's scary enough that Google, Roku and Sonos rushed through patches to address recent concerns.
What Security Threat Keeps You Up at Night?
Curt Franklin  
6/19/2017   20 comments
Which security threat is causing the most new wrinkles to appear on your face? Security Now wants to know.
Chain of Flaws Threatens Win 10
Larry Loeb  
1/1/2018   19 comments
Chaining multiple vulnerabilities can create attacks that threaten millions of Windows 10 computers.
In Facebook Debacle, More Than Zuckerberg to Blame
Larry Loeb  
3/23/2018   19 comments
Facebook and CEO Mark Zuckerberg are rightly taking a lot of heat from the fallout over Cambridge Analytica and the firm's use of social media data. However, other businesses, as well as users, need to take some responsibility as well.
Enterprise Attacks Increase 235%: Trojans & Ransomware Most Common
Larry Loeb  
4/26/2019   19 comments
The Malwarebytes Labs Cybercrime Tactics and Techniques Q1 2019 report found in just one year, threats aimed at corporate targets have increased by 235%. Trojans, such as Emotet, and ransomware were the most likely attacks.
Weak Human Link Still Main Enterprise Security Concern
Larry Loeb  
2/27/2019   19 comments
KnowBe4 study confirms what we pretty much knew already.
Digital Transformation With IoT: Assessing Risk Through Standards & Visibility
Joe Stanganelli  
2/27/2019   19 comments
IoT transformation is a gift and a curse that carries both business agility and business risk. As the world digitally transforms into something "smarter" than itself, IoT devices proliferate, demanding a lot of resources to keep up with them all – and, by extension, secure them all.
Page 1 / 2   >   >>




Latest Articles
Report found that DNS Amplification contributed to the largest share, compared to other methods, of attack activities in Q2 2019.
The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.
Global network of honeypots measured more than triple the attack traffic of the previous period, to a total of over 2.9 billion events.
But to prepare for something usually means you have an idea about what you are preparing for, no?
An emerging and increasingly sophisticated threat campaign is employing obscure file formats.
Flash Poll
Video
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2019 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with