home.aspx

 
. home.aspx home.aspx

ARCHIVED NEWS


    STRATFOR HACKER HAMMOND HELD IN CONTEMPT FOR REFUSING TO ANSWER GRAND JURY QUESTIONS

    Oct 13, 2019

    Just months before he was to be released from federal prison where he is serving time for hacking intelligence firm Statfor and releasing information to WikiLeaks , activist and hacker Jeremy Hammond, was found to be in contempt of court for failing to answer questions before a grand jury in the Eas...

    SCMAGAZINE
    READ MORE

    /news-article.aspx?ID=69236923

    NEW ISF PAPER ATTEMPTS TO DEMYSTIFY AI IN INFORMATION SECURITY

    Oct 10, 2019

    In a paper released today, the Information Security Forum is urging organizations to capitalize on the opportunities offered by artificial intelligence while taking sensible steps to reduce the risks posed by this still immature technology.  Demystifying Artificial Intelligence in Information S...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69206920

    CALIFORNIA PROPOSES REGULATIONS TO ENFORCE NEW PRIVACY LAW

    Oct 10, 2019

    California proposed new regulations Thursday that dictate how the state's tough new privacy law will be enforced. The law known as the California Consumer Privacy Act or CCPA, gives consumers more control over how companies collect and manage their personal data. It goes into effect on Jan. 1. A...

    CNET
    READ MORE

    /news-article.aspx?ID=69216921

    SURVEY REVEALS WIDESPREAD IGNORANCE OVER ATTACK THAT AFFECTS MOST COMPANIES

    Oct 09, 2019

    According to a new research survey, 68% of IT security stakeholders aren't sure whether they've experienced a Pass the Hash attack, and 4% don't even know what this globally prevalent form of attack is. These almost fantastical findings, released today by One Identity, came from a survey...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69186918

    AUTONOMOUS CYBER AI IS REVOLUTIONIZING CYBER DEFENSE

    Oct 09, 2019

    As the near-constant stream of high-profile attacks suggests, the cyber-threat landscape is rapidly evolving with no sign of slowing. Cyber-attackers are not only moving faster, they are adding new and innovative tools within their toolkits. And as the entire world turns online, we are moving toward...

    CISO MAG
    READ MORE

    /news-article.aspx?ID=69196919

    UNIVERSITY TO CREATE NEW CYBERSECURITY APPROACH INSPIRED BY THE HUMAN BODY

    Oct 08, 2019

    Researchers at the University of Arizona are developing a fresh approach to cybersecurity modeled on the human central nervous system. The new method, which is being created as part of the Partnership for Proactive Cybersecurity Training project, will aim to detect and neutralize cyber-threats in th...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69126912

    APT GROUPS EXPLOITING FLAWS IN UNPATCHED VPNS, OFFICIALS WARN

    Oct 08, 2019

    U.S. and U.K. agencies warn consumers to update VPN technologies from Fortinet, Pulse Secure and Palo Alto Networks. State-sponsored advanced persistent threat (APT) groups are using flaws in outdated VPN technologies from Palo Alto Networks, Fortinet and Pulse Secure to carry out cyber attacks on t...

    THREATPOST
    READ MORE

    /news-article.aspx?ID=69136913

    U.S. TO HELP SECURE BALTIC ENERGY GRID AGAINST CYBER ATTACKS

    Oct 06, 2019

    US Energy Secretary Rick Perry and his Lithuanian, Latvian and Estonian counterparts termed the agreement "a critical moment for the Baltic States in strengthening cybersecurity" in strategic energy infrastructure."We see a crucial role that US could play in assisting the Baltic State...

    SECURITY WEEK
    READ MORE

    /news-article.aspx?ID=69116911

    DDOS ATTACK: WHAT IS IT AND HOW TO STAY PROTECTED AGAINST IT?

    Oct 05, 2019

    DDoS attack aims at bringing services down by bombarding them with so much traffic that their services and infrastructure are unable to handle it. In a Distributed Denial of Service (DDoS) attack, multiple compromised systems are used to target a server with a huge volume of traffic. Typically, a bo...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69106910

    NEARLY 70 US GOVERNMENT ORGANIZATIONS HIT BY RANSOMWARE SINCE JANUARY

    Oct 03, 2019

    Ransomware gangs, intent on stealing American dollars, have struck at least 621 targets in the US government, education, and healthcare sectors since January. A report into stateside ransomware attacks, released on October 1 by antivirus company Emisoft, which is an associate partner in Europol&rsqu...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69086908

    FDA ISSUES CYBERSECURITY WARNING FOR MEDICAL DEVICES

    Oct 03, 2019

    The US Food and Drug Administration (FDA) issued a warning on Tuesday over vulnerabilities detected in decades-old software being used by many medical devices and hospital networks. The 11 vulnerabilities exist in IPnet, a third-party software component that supports network communications between c...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69096909

    LATEST U.S. HEALTHCARE RANSOMWARE ATTACKS HAVE HARSH IMPACT

    Oct 02, 2019

    A recent rash of ransomware attacks in the U.S. healthcare sector shows the serious disruptions these assaults can pose - including temporarily, or even permanently, stopping patient care. For example, Wood Ranch Medical a small clinic in Simi Valley, Calif., has announced it plans to close because ...

    BANKINFOSECURITY
    READ MORE

    /news-article.aspx?ID=69076907

TRENDING NEWS


    INFORMATION SECURITY FORUM RELEASES INTERNET OF THINGS GUIDE

    Nov 12, 2019

    The Information Security Forum (ISF) announced the release of Securing the IoT: Taming the Connected World,  a report that helps security professionals better understand the security implications of the Internet of Things (IoT).According to the Information Security Forum (ISF), the IoT has expl...

    SECURITY MAGAZINE
    READ MORE

    /news-article.aspx?ID=69756975

    ORVIS PASSWORDS LEAKED TWICE ON PASTEBIN

    Nov 12, 2019

    Internal passwords belonging to American retailer Orvis were twice leaked online in a double data breach. Credentials belonging to the luxury fishing equipment purveyor were posted on the website Pastebin.com last month, according to investigative reporter Brian Krebs. A swathe of plaintext username...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69766976

    MY HEALTH RECORD AVOIDS CYBERSECURITY BREACHES DESPITE DIZZYING GROWTH IN USAGE

    Nov 11, 2019

    The compromise of Monash IVF marks the latest in a string of cyberattacks on healthcare providers but the government’s controversial My Health Record (MyHR) system escaped compromise during the last financial year, with no malicious breaches recorded despite the addition of more than 550 milli...

    CSO
    READ MORE

    /news-article.aspx?ID=69726972

    IS GOOGLE'S CYBERSECURITY PROJECT ‘CHRONICLE’ IN TROUBLE?

    Nov 11, 2019

    Google's cybersecurity project named "Chronicle" is imploding in trouble and some employees feel its management "abandoned and betrayed" the original vision, media reports said. Chronicle's CEO and Chief Security Officer have already left, and the Chief Technology Officer...

    THE NEWS MINUTE
    READ MORE

    /news-article.aspx?ID=69736973

    FOLLOWING SMARTERASP’S SECURITY INCIDENT, HERE’S A CYBERSECURITY CHECKLIST FOR CHOOSING A HOSTING PROVIDER

    Nov 11, 2019

    SmarterASP, a major hosting provider, was the victim of a ransomware attack recently. The attack resulted not just in customer data being encrypted, but also the hosting provider’s website suffering downtime.Choosing a hosting provider is a crucial step in setting up a website. In the light of...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69746974

    ANALYSIS: THE CYBERSECURITY SPACE IS EVOLVING, BUT IT’S STILL BROKEN

    Nov 10, 2019

    The cybersecurity space has undergone a seachange over the past decade with organizations finding themselves under almost constant attack from an array of state-sponsored attackers and increasingly skillful and professional criminals.It’s often said that money is the root of all evil and it&rs...

    SILICONANGLE
    READ MORE

    /news-article.aspx?ID=69716971

    COMMON EVASIVE PHISHING TACTICS THAT CYBERCRIMINALS OPT TO SPREAD RANSOMWARE

    Nov 07, 2019

    There has been a steep rise in ransomware attacks against multiple government organizations, and cities across the globe. Hackers are frequently creating campaigns designed to take advantage of local employees and steal their credentials to break into computer networks. Once inside, the bad actors e...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69706970

    THE DECLINING EFFECT OF DISCLOSURES ON THREAT GROUPS

    Nov 06, 2019

    In the past, cyber espionage groups were observed to cease activities and shut down following a disclosure. However recent observations show that disclosures cause malicious groups to change tactics and not disappear. Some groups were observed to cover up their tracks better while a few even express...

    CYWARE
    READ MORE

    /news-article.aspx?ID=69676967

    DRONE WARS: EXPERTS WARN OF FLYING NETWORK SECURITY THREAT

    Nov 06, 2019

    Drones could become a major network security threat from 2020, forcing organization to guard the airspace around their buildings, security researchers have warned. Small unmanned aerial vehicles (UAVs) will increasingly evolve from novelty items to “ubiquitous business tools” over the co...

    INFOSECURITY
    READ MORE

    /news-article.aspx?ID=69686968

    MICROSEGMENTATION AND ISOLATION: 2 ESSENTIAL STRATEGIES IN ZERO-TRUST SECURITY

    Nov 06, 2019

    The headlines over the past few years have been consistent – enterprises are pouring more and more money into cybersecurity countermeasures. Indications are that 2020 will be no different, with reports that nearly three quarters of CISOs plan to ask their CFOs for increased cybersecurity inves...

    THREATPOST
    READ MORE

    /news-article.aspx?ID=69696969

    WHISTLEBLOWER EDWARD SNOWDEN TALKS DATA EXPLOITATION AT LISBON 'WEB SUMMIT' CONFERENCE

    Nov 05, 2019

    Two of the world’s best-known whistleblowers are among the highlights at a European technology conference. Edward Snowden addressed the Web Summit in Lisbon, Portugal, this evening (November 4). Brittany Kaiser is slated to address the summit later this week. Snowden, a former NSA analyst, spo...

    EURONEWS
    READ MORE

    /news-article.aspx?ID=69616961

    WHAT CAN HAPPEN IN 3 CYBERSECURITY SECONDS?

    Nov 05, 2019

    We are all too familiar with the phrase “time is money” – and yet, with today’s technology and advancements, when a multitude of security events can take place within a short amount of time, it is becoming easier to quantify the exact value of time. What does three seconds me...

    INFORMATION SECURITY BUZZ
    READ MORE

    /news-article.aspx?ID=69626962

SPOTLIGHT

Over the last few years, IT security has become a lot more mainstream within organizations. Sian John discusses the need for businesses to focus on protecting information, identities and devices. Originally filmed for https://www.gemalto.com/review/

RESOURCES

Events