Live Webinar | 2018 Risk Management: Aligning Security, Risk & Executive Teams

Bio Image
You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

The Total Cost of Fraud

Fraud IBM's Rob Rendell on How Financial Institutions Must Adopt a New Mindset in Fighting Fraud( SecurityEditor ) • April 18, 2018     Rob Rendell of IBM Rob Rendell spent...
Continue reading
0 Comments

The 'New Science' of Cybersecurity

Artificial Intelligence & Machine Learning , Next-Generation Technologies, Secure Development , NIST Standards NTT Security's Khiro Mishra and Don Gray Discuss a New Approach( @nickster2407 ) • April 18, 2018...
Continue reading
0 Comments

Managing Third-Party Risks

Risk Management , Vendor Management Bitsight's Tom Turner on Security Ratings( @nickster2407 ) • April 18, 2018     Tom Turner, CEO, BitSight Technologies Managing third-party risks is more critical than...
Continue reading
0 Comments

Preparing for Mid-Term Elections

Cyberwarfare / Nation-state attacks , Fraud Management, Cybercrime FBI's Elvis Chan on Efforts to Bolster Cybersecurity of Social Media( SecurityEditor ) • April 18, 2018     Elvis Chan, supervisory special...
Continue reading
0 Comments

iPhones, iPads Can Be Hacked via 'Trustjacking' Attack

Trustjacking only requires a user to trust a malicious or compromised device
A feature that allows users to wirelessly sync their iPhones and iPads with iTunes can be abused by hackers to take control of iOS devices in what researchers call a...
Continue reading
0 Comments

Popular Android Apps Leak User Data via Third-Party SDKs

Popular mobile applications that use third-party, ready-to-go advertising Software Development Kits (SDKs) expose user data by transmitting it over the insecure HTTP protocol, Kaspersky Lab warns. While analyzing popular dating...
Continue reading
0 Comments

Russia Says to Probe Facebook After Telegram Crackdown

Russia's telecoms watchdog plans to probe Facebook before the end of the year after blocking access in the country to the popular messaging app Telegram, its head said on Wednesday....
Continue reading
0 Comments

Honeypot Shows the Power of Automation in the Hands of Hackers

Honeypot Experiment Shows the Commoditization of Using Bots to Perform Low-level Hacking Tasks Next-gen endpoint detection and response firm Cybereason wanted to test two hypotheses: first, that hackers are ignoring...
Continue reading
0 Comments

Chrome 66 Distrusts Older Symantec Certificates

Released in the stable channel on Tuesday, Chrome 66 removes trusts in website certificates that Symantec issued before June 1, 2016, while also bringing a trial of Site Isolation, and...
Continue reading
0 Comments

Rockwell Automation Switches Exposed to Attacks by Cisco IOS Flaws

Cisco IOS vulnerabilities impact Allen-Bradley Stratix industrial switches
Rockwell Automation informed customers this week that its Allen-Bradley Stratix and ArmorStratix industrial switches are exposed to remote attacks due to vulnerabilities in Cisco’s IOS software. Allen-Bradley Stratix and ArmorStratix...
Continue reading
0 Comments

Few RSA Conference Exhibitors Implemented DMARC

Many RSA Conference exhibitors failed to implement DMARC
A vast majority of the companies present this week at the 2018 RSA Conference in San Francisco have not implemented the DMARC email authentication system on their domains, opening the...
Continue reading
0 Comments

The Kiss of Death for Passwords: Machine Learning?

Since the introduction of computers, user names and passwords have been the primary method used for access control and authentication. However, as post-mortem analysis of data breaches reveals, compromised credentials...
Continue reading
0 Comments

Microsoft Takes Security to the Edge

Microsoft Unveils New Services and Features to Secure Internet of Things (IoT) Devices At RSA Conference this week in San Francisco, Microsoft announced new tools and technologies aimed at protecting...
Continue reading
0 Comments

Security Pros at Energy Firms Concerned About 'Catastrophic' Attacks

Main concerns in energy sector
Many cybersecurity professionals working in the energy sector are concerned that an attack on their organization’s industrial control systems (ICS) could have “catastrophic” consequences, according to a study conducted recently...
Continue reading
0 Comments

Oracle Patches 254 Flaws With April 2018 Update

Oracle’s Critical Patch Update (CPU) for April 2018 contains 254 new security fixes, 153 of which address vulnerabilities in business-critical applications. A total of 19 products received security updates in...
Continue reading
0 Comments

Drupal Sites Targeted With Backdoors, Miners in Drupalgeddon2 Attacks

Drupalgeddon2
The recently patched Drupal vulnerability tracked as CVE-2018-7600 and dubbed Drupalgeddon2 has been exploited in the wild to deliver backdoors, cryptocurrency miners and other types of malware. While much of...
Continue reading
0 Comments

Facebook Admits to Tracking Non-Users Across the Internet

Facebook this week confirmed that it indeed knows when users access websites and apps that use Facebook services, even if they don’t have an account on the social network. The...
Continue reading
0 Comments

CrowdStrike Unveils New Endpoint Protection, Threat Analysis Solutions

CrowdStrike unveils new solutions
CrowdStrike this week unveiled its new Falcon Endpoint Protection Complete solution and announced the addition of an automated threat analysis module to its Falcon platform. Falcon Endpoint Protection Complete is...
Continue reading
0 Comments

Trend Micro Analyzes Writing Style to Detect Email Fraud

Trend Micro on Monday unveiled a new capability that allows its products to identify email fraud attempts by using a writing style analysis system powered by artificial intelligence (AI). The...
Continue reading
0 Comments