Latest Cybersecurity Articles

EMV migration delay doesn’t let gas stations completely off the hook

EMV migration delay doesn’t let gas stations completely off the hook

Dec 8, 2016

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t…

Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower

Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower

Dec 7, 2016

Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by…

Security pros most worried about clouds, mobile

Security pros most worried about clouds, mobile

Dec 5, 2016

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning.Around 60…

AI is coming, and will take some jobs, but no need to worry

AI is coming, and will take some jobs, but no need to worry

Dec 2, 2016

The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…

Scholars, infosec experts call for action on Russian hacking

Scholars, infosec experts call for action on Russian hacking

Dec 1, 2016

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

Dec 1, 2016

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually…

SIEMs-as-a-service addresses needs of small, midsize enterprises

SIEMs-as-a-service addresses needs of small, midsize enterprises

Nov 30, 2016

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…

Report: Most cybercriminals earn $1,000 to $3,000 a month

Report: Most cybercriminals earn $1,000 to $3,000 a month

Nov 30, 2016

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…

The Dark Web: What to know about the underground Internet

The Dark Web: What to know about the underground Internet

Nov 22, 2016

There’s more to the Internet than most people are aware of.

Ransomware victims able to thwart attacks, report says

Ransomware victims able to thwart attacks, report says

Nov 18, 2016

The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files,…

Battling global DDoS attacks requires coordinated response

Battling global DDoS attacks requires coordinated response

Nov 18, 2016

Service providers that run the backbone of the internet need to have a coordinated response to deal with a global distributed denial of service attack,…

Report: Surveillance cameras most dangerous IoT devices in enterprise

Report: Surveillance cameras most dangerous IoT devices in enterprise

Nov 17, 2016

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…

Security experts divided on ethics of Facebook’s password purchases

Security experts divided on ethics of Facebook’s password purchases

Nov 16, 2016

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts…

Visibility, security top concerns for cloud computing adoption

Visibility, security top concerns for cloud computing adoption

Nov 10, 2016

Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…

AI makes security systems more flexible

AI makes security systems more flexible

Nov 8, 2016

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…

Flood of threat intelligence overwhelming for many firms

Flood of threat intelligence overwhelming for many firms

Nov 3, 2016

Three years after Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still…

Unencrypted pagers a security risk for hospitals, power plants

Unencrypted pagers a security risk for hospitals, power plants

Nov 1, 2016

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…

Why don’t developers have a ‘spellchecker’ for security’?

Why don’t developers have a ‘spellchecker’ for security’?

Oct 31, 2016

Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities.Of course, nobody is perfect. We all make mistakes,…

Russian criminals’ bank attacks go global

Russian criminals’ bank attacks go global

Oct 26, 2016

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…

Flash mobs the latest threat this holiday season

Flash mobs the latest threat this holiday season

Oct 26, 2016

The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…

Cybersecurity ‘ninjas’ value challenges, training and flexible schedules over pay

Cybersecurity ‘ninjas’ value challenges, training and flexible schedules over pay

Oct 19, 2016

Challenging work, skills training and flexible work hours are important for all cybersecurity employees, but especially so for the highest skilled workers, according to a…

Researcher unveils second Samsung Pay vulnerability

Researcher unveils second Samsung Pay vulnerability

Oct 19, 2016

Samsung just can’t catch a break these days. Its phones are exploding, and so are its washing machines, and now a security researcher has found…

Yahoo shows that breach impacts can go far beyond remediation expenses

Yahoo shows that breach impacts can go far beyond remediation expenses

Oct 13, 2016

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Oct 12, 2016

Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on…

Leaky IoT devices help hackers attack e-commerce sites

Leaky IoT devices help hackers attack e-commerce sites

Oct 12, 2016

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…

How Shodan helped bring down a ransomware botnet

How Shodan helped bring down a ransomware botnet

Oct 7, 2016

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…

Data leaks evolving into weapons of business destruction

Data leaks evolving into weapons of business destruction

Oct 3, 2016

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…

Diversified supply chain helps ‘Vendetta Brothers’ succeed in criminal business

Diversified supply chain helps ‘Vendetta Brothers’ succeed in criminal business

Sep 29, 2016

Even smaller criminal groups are using smart business tactics to help insulate them from risk, such as the Vendetta World online shop, which sells credit…

73% of companies using vulnerable end-of-life networking devices

73% of companies using vulnerable end-of-life networking devices

Sep 28, 2016

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000…

Spreading Security: California bank arms businesses with cybersecurity education, software and insurance

Spreading Security: California bank arms businesses with cybersecurity education, software and insurance

Sep 27, 2016

Cybercriminals could be getting better, and more creative, at stealing money from businesses.