Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Latest Content
Page 1 / 2   >   >>
Education Sector CISOs Get High Marks on Security
News Analysis  
7/18/2018   Post a comment
In a surprise outcome, the education sector rises to the top of a SecurityScorecard assessment for its ability to protect data assets despite connecting thousands of unsecured devices and even some determined student hackers.
AWS' Werner Vogels: 'Security Is Everyone's Job'
News Analysis  
7/18/2018   Post a comment
At the AWS New York Summit, CTO Werner Vogels detailed how security is a much wider responsibility, and how automation and encryption are essential to better (and more secure) application development in the cloud.
iPhone Users Targeted in Mobile Malware Attack
News Analysis  
7/17/2018   Post a comment
Cisco Talos has found a complex mobile malware attack that tricks users into downloading compromised MDM software onto their iPhones.
Researchers Detail Spoofing Attack Against Vehicle GPS
Larry Loeb  
7/17/2018   Post a comment
A new paper shows that with the right amount of hardware and know-how, an attacker can spoof a vehicle's GPS system and change the route.
ZTE Cleared to Return to Business After US Lifts Ban
News Analysis  
7/17/2018   1 comment
Despite hefty fines and concerns about national security, ZTE is cleared to return to business after the US lifted its ban on selling components to the company.
IDT CIO Faces Down New Crop of Global Threats
Simon Marshall  
7/16/2018   Post a comment
IDT CIO Golan Ben-Oni has faced down two serious cyberattacks in the last year and he expects more are on the way. From selecting vendors to thinking about the cloud, here's how Ben-Oi is rethinking the security landscape.
Broadcom's Deal for CA Puts Big Iron in the Spotlight
Larry Loeb  
7/16/2018   Post a comment
With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.
Twelve Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign
News Analysis  
7/13/2018   2 comments
The DOJ and the Special Counsel's Office indicted 12 Russian nationals, charging them with hacking into the networks of the Democratic Congressional Campaign Committee, the Democratic National Committee and the Hillary Clinton presidential campaign.
Attackers Increasingly Turning Attention to the Cloud
Jeffrey Burt  
7/13/2018   10 comments
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
Bug Bounty Programs Paying Off for Enterprises
Larry Loeb  
7/13/2018   3 comments
The number of bug bounty programs continues to grow, and enterprise security is better for it. A new report urges more businesses to embrace and not squash these initiatives.
IBM: Hidden Costs Drive Up Financial Hit of Mega Breaches to $350M
Jeffrey Burt  
7/12/2018   1 comment
For companies that have 50 million records compromised, lost business and reputation, as well as the employee time spent in recovery work, can put the overall cost at $350 million.
Kaspersky: Asia the Focus of APT Operations in Q2
Jeffrey Burt  
7/12/2018   Post a comment
In their second quarter report, Kaspersky researchers also noted the return of various well-known bad actors and the threats facing networking hardware devices.
'RDP Shops' Proliferate Throughout the Dark Web
News Analysis  
7/11/2018   Post a comment
For as little as $10, McAfee researchers found that they could buy access to the security and building automation systems of a US airport thanks to the proliferation of 'RDP shops' across the dark web.
Magecart Group Seen as Hidden Hand Behind Ticketmaster Attack
Larry Loeb  
7/11/2018   4 comments
By targeting third-party vendors that Ticketmaster uses to help process payment, the Magecart group appears to be expanding the scope of its cybercrimes, according to RiskIQ.
AT&T Absorbs AlienVault's Cybersecurity Insights
News Analysis  
7/11/2018   1 comment
The new combo of AT&T and AlienVault will power the carrier's new SMB security services but it's not yet certain how reports and research from the Open Threat Exchange will be impacted.
HNS IoT Botnet Evolves, Goes Cross-Platform
Jeffrey Burt  
7/10/2018   2 comments
The Hide 'N Seek malware had previously targeted devices such as home routers and DVRs, but now the botnet is including Apache CouchDB and OrientDB in its expanding list of targets.
Cisco: GDPR Is About More Than Compliance
Jeffrey Burt  
7/10/2018   Post a comment
Cisco's top privacy official says that the EU's new privacy regulations – GDPR – gives forward-thinking companies an opportunity to excel by building new data management and privacy models.
PG&E Allows Substantial Account Access Without a Password, Researcher Finds
News Analysis  
7/9/2018   Post a comment
After checking his own PG&E account, security researcher Justin Troutman found that the utility company allowed users to access accounts without a password. The company claims accounts are safe.
Attackers Combining Smoke Loader & PROPagate in New Campaign
Larry Loeb  
7/9/2018   Post a comment
Cisco Talos researchers have found that attackers have started to combine Smoke Loader and the PROPagate injection in a new campaign delivered through phony Word documents.
APTs: Now's the Time for a New Approach
News Analysis  
7/6/2018   Post a comment
Advanced Persistent Threats, or APTs, are one of the greatest problems that enterprises face today. However, security teams have been taking the wrong approach...
Google, Firefox Pull Stylish After Report Shows How Data Is Collected
Larry Loeb  
7/6/2018   10 comments
A security researcher showed how the Stylish browser extension sent personal data and search results back to the parent company, and this forced Mozilla and Google to yank it off their stores.
How Quantum Physics Will Protect Against Quantum-Busting Encryption
Jeffrey Burt  
7/5/2018   Post a comment
The CEO of the startup Quantum Xchange envisions a nationwide dark fiber quantum network that protects encrypted data in transit with an on-demand Quantum Key Distribution service.
How the Cloud Is Changing the Identity & Access Management Game
Simon Marshall  
7/5/2018   Post a comment
Fresh off a $17.5M funding round, startup Preempt is one of several companies that is looking to change the identity and access management game as the enterprise shifts to the cloud.
Researchers Show How Attackers Can Crack LTE Data Link Layer
Larry Loeb  
7/4/2018   4 comments
In a paper, researchers show how an attacker with the right equipment can crack the data link layer of an LTE network. It's mostly theoretical, but it shows why upcoming 5G security standards need to be tougher.
Automated Network Security Is Crucial, but No Panacea
News Analysis  
7/3/2018   1 comment
As attacks get more sophisticated and business gets more mobile and distributed, automation capabilities enable networks to keep up with the rapid pace of change.
Cybercriminals Start Looking Beyond the Dark Web
Simon Marshall  
7/3/2018   2 comments
For years, the Dark Web was seen as a safe haven for cybercrime. Now, a new report finds that cybercriminals are turning toward newer technologies, such as Blockchain DNS, to shield their activities.
Second Equifax Employee Facing Insider Trading Charges
News Analysis  
7/3/2018   1 comment
The SEC, along with the Justice Department, has charged Sudhakar Reddy Bonthu, a former software engineer at Equifax, with insider trading following the 2017 data breach at the credit reporting agency.
RIG Exploit Kit Injects Code That Creates Monero Miner
News Analysis  
7/2/2018   10 comments
Researchers at FireEye have found the first instance of the RIG exploit kits injecting code into machines that creates a malicious Monero miner.
Seamless Cloud Security Depends on Encryption Done Right
Joe Stanganelli  
7/2/2018   2 comments
As the enterprise shift to the cloud, there's a debate about what's best for securing data as it moves from one platform to another. A Boston startup is looking to encrypt data in motion and at rest, and this could be the next big trend.
Mobile Malware Group Hits Google Play a Third Time
Jeffrey Burt  
6/29/2018   16 comments
McAfee researchers found that AsiaHitGroup earlier this year again targeted Android device users in Asia with a bulked-up Sonvpay campaign complete with silent push notifications.
'Bad Bots' Invading Cellular Networks
Larry Loeb  
6/29/2018   13 comments
A new research paper from Distil Networks finds that 'bad bots' are roaming cellular networks and are using these gateways as part of numerous attacks.
Equifax Agrees to Implement New Security Measures
News Analysis  
6/28/2018   24 comments
Equifax and eight states have signed an agreement that will have the company implement new security rules, following one of the largest data breaches in history. The news comes as a Florida firm may have exposed the records of millions to the open Internet.
McAfee: Cybercriminals Improving Techniques as Cryptomining Explodes
Jeffrey Burt  
6/28/2018   19 comments
Cybercrime campaigns during the quarter showed that bad actors are improving upon the threats from last year, according to McAfee. Meanwhile, cryptomining schemes continue to skyrocket.
CenturyLink Enhances Log Management for Hybrid Networks
News Analysis  
6/28/2018   3 comments
CenturyLink's new Security Log Management 2.0 ingests data from multiple types of logs to give greater visibility and protection over cloud and mobile networks.
Massive Bot Armies Target the Hospitality Industry
News Analysis  
6/27/2018   10 comments
Research from Akamai finds that the entire hospitality industry is under assault from armies of bots that are conducting DDOS attacks and attempting to steal data from websites.
Wi-Fi Alliance: WPA3 Standard Will Improve WiFi Security, Encryption
Larry Loeb  
6/27/2018   8 comments
After 20 years, the Wi-Fi Alliance has released a new WiFi standard WPA3 which looks to offer greater security and encryption to consumers in the home as well as enterprise networks.
IBM Spinout Senzing Fights Fraud, Insider Threats With AI
Jeffrey Burt  
6/26/2018   9 comments
Senzing, a rare IBM spinout, enables organizations to quickly and easily run through thousands of corporate records to find bad actors that represent a threat to their businesses.
Cloud-Based Identity Management Systems: What to Look For
Alan Zeichick  
6/26/2018   Post a comment
Most of the big cloud players, including Google, Microsoft and AWS, all offer some form of identity and access management. There are plenty of other cloud-based, on-premises IAM systems as well. Here's what you need to look for.
Phishing Attacks Are Increasing & Gaining in Sophistication
News Analysis  
6/25/2018   6 comments
Reports from Palo Alto Networks and Barracuda Networks show that different types of phishing attacks are increasing, and becoming more sophisticated and deceptive.
Adware & Cryptomining Remain Top Enterprise Security Threats
Larry Loeb  
6/25/2018   7 comments
New research from Morphisec Labs finds that adware remains a consistent if under-reported security problem for many enterprises. At the same time, cryptomining remains the go-to attack for many cybercriminals.
How to Find a Next-Generation Firewall for the Cloud
Alan Zeichick  
6/25/2018   1 comment
If you use cloud-based servers for running business applications, you need to protect those servers with a software-based cloud firewall. There are many options, and here's how to choose.
Tesla Lawsuit Claims Insider Breached Company Security
News Analysis  
6/22/2018   6 comments
Tesla has filed a lawsuit against a former employee, claiming he violated company policies, damaged equipment and stole data. The truth is more complicated but the incident shows the threats insiders can pose.
Google, Roku, Sonus Rush Out Patches for DNS Vulnerability
Larry Loeb  
6/22/2018   20 comments
DNS rebinding might be ancient in security terms, but it's scary enough that Google, Roku and Sonos rushed through patches to address recent concerns.
Satori Botnet Targeting D-Link Routers in Latest Attack
News Analysis  
6/21/2018   1 comment
The Mirai-based Satori botnet is targeting a widely used router and modem device from D-Link in an attack discovered this week, according to an analysis from Radware.
Containers in the Cloud Are Great, but Are They Secure?
Alan Zeichick  
6/21/2018   4 comments
Containers are an efficient means to package, deploy and run software in the cloud. There are legitimate security concerns, however.
Olympic Destroyer Returns With Attacks in Europe
Jeffrey Burt  
6/20/2018   1 comment
Kaspersky Labs researchers believe the hackers behind the Olympic Destroyer worm that wreaked havoc at the Winter Olympics are now focusing on organizations that research chemical and biological threats in Europe.
Cyber Criminals Using Hidden Tunnels to Attack Banks, Financial Institutions
News Analysis  
6/20/2018   1 comment
A new study from Vecta finds that cyber criminals are using so-called hidden tunnels to carry out sophisticated command and control attacks designed to steal personal data from banks and other financial institutions.
Betabot Trojan Reborn in New Sophisticated Form
Larry Loeb  
6/20/2018   Post a comment
As far as malware goes, the Betabot Trojan has gone through several different incarnations. However, its latest form might be the most sophisticated and laying the groundwork for an even larger attack.
Blockchain & Cryptocurrency Becoming Greater Security Concerns
News Analysis  
6/19/2018   6 comments
The rise of schemes targeting cryptocurrencies is starting to raise concerns about blockchain security, according to a new study conducted by McAfee.
World Cup Penalty: Phishing Campaign Targets Soccer Fans
News Analysis  
6/19/2018   1 comment
Check Point has uncovered a phishing campaign targeting fans of the FIFA World Cup, with cybercriminals attempting to get people to download a schedule of fixtures and a result tracker that hide malicious software.
Page 1 / 2   >   >>




Latest Articles
A new paper shows that with the right amount of hardware and know-how, an attacker can spoof a vehicle's GPS system and change the route.
IDT CIO Golan Ben-Oni has faced down two serious cyberattacks in the last year and he expects more are on the way. From selecting vendors to thinking about the cloud, here's how Ben-Oi is rethinking the security landscape.
With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.
In the first half of 2018, Check Point researchers saw threat actors turning more of their attention to the cloud to steal data, as well as to grab compute power for cryptomining efforts.
The number of bug bounty programs continues to grow, and enterprise security is better for it. A new report urges more businesses to embrace and not squash these initiatives.
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with