SIEMs-as-a-service addresses needs of small, midsize enterprises
The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…
Report: Surveillance cameras most dangerous IoT devices in enterprise
Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…
Visibility, security top concerns for cloud computing adoption
Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…
AI makes security systems more flexible
Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…
Unencrypted pagers a security risk for hospitals, power plants
For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…
Flash mobs the latest threat this holiday season
The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…
Russian criminals’ bank attacks go global
Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…
Yahoo shows that breach impacts can go far beyond remediation expenses
Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…
Leaky IoT devices help hackers attack e-commerce sites
Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…
How Shodan helped bring down a ransomware botnet
Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…
Data leaks evolving into weapons of business destruction
Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…
NY regulation aims to raise bank security standards
Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation — and, so far, security experts…
A single ransomware network has pulled in $121 million
A single ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million…
Half of network management systems vulnerable to injection attacks
Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half…
New tech can help catch spearphishing attacks
A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.Everything about the letter…
Deception technology grows and evolves
Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…
Experts challenge Skyhigh’s patent for cloud-based encryption gateway
Skyhigh announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive data…
Experts challenge Skyhigh’s patent for cloud-based encryption gateway
Skyhigh announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive data…
Samsung both denies and admits mobile payment vulnerability
Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be…
Insurers working to fill cyberinsurance data gaps
Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That’s not the case with cyber risk, however. There’s…
Report: Only 3 percent of U.S. companies pay attackers after ransomware infections
Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while…
Health care organizations 114 times more likely to be ransomware victims than financial firms
Health care organizations were 114 times more likely to hit by ransomware infections than financial firms, and 21 times more likely than educational institutions, according…
New HIPAA guidance addresses ransomware
The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need…
Fake Olympic tickets and Zika news apps scam users
These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the…
Rio Olympics pose security risks to travelers
Police officers held up a sign saying “Welcome to Hell” at the Rio airport last week, according to local and international news reports, and the…
Dangerous keyboard app has more than 50 million downloads
The Flash Keyboard app has been downloaded more than 50 million times — but is capable of some extremely dangerous behaviors.”It looked like it was…
BYOD can pose privacy risks to employees
Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees…
Spearphishing attacks target boards
With great power comes great responsibility — and also a great big target painted on your head. At least, that’s the case lately with corporate…
Study: Most companies can’t protect confidential documents
A majority of companies don’t have the technology in place to keep employees from sharing confidential documents, according to a study released today.In particular, only…
Many smartphones still left unpatched
Shaming carriers and smartphone manufacturers into applying patches faster is a step forward, but a lot more needs to be done to improve security of…