New framework helps companies quantify risk
The World Economic Forum has released a new framework this week that helps companies calculate the risk of cyberattacks.
Maria Korolov | 24 Jan | Read more
The World Economic Forum has released a new framework this week that helps companies calculate the risk of cyberattacks.
Maria Korolov | 24 Jan | Read more
In his State of the Union address Tuesday night, President Barack Obama promised to protect a free and open Internet and urged Congress to pass cybersecurity legislation, but the lack of concrete movement forward was a disappointment for many security experts.
Maria Korolov | 23 Jan | Read more
For the first time, companies are worried more about preventing a breach than on passing a compliance audit -- and are spending the money to prove it, according to a new global survey of IT and business managers.
Maria Korolov | 22 Jan | Read more
New malware piggy-backing on the viral "Je suis Charlie" slogan demonstrates the continuing evolution of malware writers, able to respond to trends quickly and with a robust distribution infrastructure.
Maria Korolov | 21 Jan | Read more
There is a widening gap between what security executives believe to be true and the reality of cyberthreats, according to the Cisco 2015 Annual Security Report released today.
Maria Korolov | 21 Jan | Read more
Only 28.6 percent of retailers remain compliant during the time between compliance assessments, according to a preview of the Verizon's 2015 PCI Report.
Maria Korolov | 21 Jan | Read more
Mobile users encountered malware 75 per cent more often in 2014 compared to 2013, according to a new report from San Francisco-based mobile security firm Lookout, Inc.
Maria Korolov | 16 Jan | Read more
President Barack Obama followed up Monday's speech about data breach notification with another speech Tuesday encouraging companies to share information about cyberattacks.
Maria Korolov | 16 Jan | Read more
President Barack Obama previewed a new data breach notification law today in a speech to the Federal Trade Commission, which will set a 30-day deadline for notifications.
Maria Korolov | 14 Jan | Read more
The Shodan search engine can be used to find routers with exposed backdoors, unsecured webcams, and industrial control systems still using default passwords.
Maria Korolov | 14 Jan | Read more
Only 8 percent of companies know the scope of shadow IT at their organizations, according to a new survey by the Cloud Security Alliance.
Maria Korolov | 14 Jan | Read more
We'll be seeing more severe vulnerabilities like Shellshock and Heartbleed in 2015, predicts Akamai Technologies Inc., the leading content delivery network. The use of cheap online hacking toolkits will continue to proliferate, as will politically motivated attacks such as those during last year's World Cup.
Maria Korolov | 10 Jan | Read more
Criminals hijacked ads on AOL's Advertising.com network and served drive-by malware downloads to visitors to the Huffington Post, LA Weekly, GameZone, and other sites last week, according to a report from Santa Clara-based security company Cyphort Inc.
Maria Korolov | 09 Jan | Read more
When a third party inserts itself between a user and a destination website and uses fake SSL certificates in an attempt to cover it up, it's usually known as a "man-in-the-middle" attack, and offers an opportunity for outsiders to eavesdrop on conversations and steal credentials.
Maria Korolov | 08 Jan | Read more
Are you a criminal looking for vulnerable computers in a particular geographic area so that you can, say, attack a specific bank based in that region?
Maria Korolov | 24 Dec | Read more