Is Everything We Know About Password Stealing Wrong?
From Microsoft Research comes an interesting article about the viability of password stealing as a criminal business (in the context of committing financial fraud/theft). Here is a summary: Federal...
View ArticleTwo Critical Security Issues You Should Tackle Today
… if you haven’t already, that is. There has been a barrage of coverage lately addressing ongoing security issues with Java and Universal Plug-and-Play (UPnP). Summarizing a mountain of detail that is...
View ArticleDestructive Malware – The New Trend?
The concerning trend of malware being used to create mayhem within an organization or across a large population of disparate devices seems to be here to stay. Within the security industry, one must...
View ArticleDoS Attacks on Call Centers?
This is worth keeping an eye on. If the perpetrators’ focus shifts to private enterprise or provider central monitoring stations, it could create entirely new problems for our industry: From CSO...
View ArticleCan Your Systems Withstand a 200Gbps DDoS Attack?
The numbers are amazing – and should concern anyone with critical systems that rely on IP connectivity, and those operating in data centers with this kind of “attractive” bandwidth… (emphasis below...
View ArticleInternet Scans Turn Up More Unsecured Hardware
Vulnerable terminal servers reflect bigger security problem April 26, 2013 — CSO — Security weaknesses uncovered in terminal servers used to provide an Internet connection to a wide variety of...
View ArticleAnother Reason to Keep Keys in Your Pocket!
We learned this week about an unbelievably bad idea in the way of an online business called “Keys Duplicated” that will copy mechanical keys from a photograph submitted via their site. Users are...
View ArticleIZON Cameras Hacked – Just the latest home security device in a long list…
The IZON surveillance camera sold in Apple Stores and Best Buy outlets is filled with security holes that enable a hacker to easily commandeer the device, a security researcher said. In this case, the...
View ArticleEncrypting the Web: Who is Doing What?
The Electronic Frontier Foundation (EFF) has updated their report on the support of various encryption and security methods by popular online service providers. Best to check out the original post...
View ArticleLinux Worm Targets Embedded Devices
Dark Reading (12/06/13) Chickowski, Ericka A newly discovered Linux worm targeting embedded devices is the latest example of such attacks aimed at the Internet of Things. The Zollard worm was...
View Article
More Pages to Explore .....