This kind of problem happens to everybody, says Marcus Ranum, CSO of Tenable Network Security, in response to the widely publicized breach at RSA. And maybe hes right. Perhaps this kind of problem does happen to everyone. But should it?
Phishing represented more than half of the 107,439 cyber incidents compiled by the U.S.-CERT for fiscal year 2010 from federal, state and local governments, commercial enterprises, American citizens and foreign CERT teams.
Skimming remains the top threat to ATMs worldwide, but certain regions are also seeing a rise in logical security breaches - malware - according to Chuck Somers, VP of ATM Security and Systems with Diebold, the global ATM supplier.
"In this future, cyber devices have innate capabilities that enable them to work together to anticipate and prevent cyber attacks and recover to a trusted state," says DHS Deputy Undersecretary Philip Reitinger.
Users of RSA's SecurID two-factor authentication products, acting on advice from the company, are devising strategies to monitor for threats and take preventive steps in the aftermath of a hacker attack against the products.
Auditors find that the SEC's IT office documented and incorporated National Institute of Standards and Technology patch requirements in its policies and procedures but that guidance wasn't always followed.
RSA executives haven't been commenting publicly since the security solutions vendor revealed last week it had been victimized by a sophisticated cyberattack aimed at its SecurID two-factor authentication product. But weeks before the hack, I spoke with RSA Chief Technology Officer Bret Hartman about advanced...
The federal list of major health information breaches that have occurred since September 2009 included 249 incidents affecting nearly 8.3 million individuals as of Tuesday. But the total affected could surpass 10 million once details about the recent Health Net breach are added.
Phishy HTML pages e-mailed as attachments get past spam filters because the messages themselves contain no overt URLs to scan and catch, says online security expert Neil Schwartzman. "It's almost unsophisticated, but it's clever."
SANS Institute's Alan Paller estimates that fewer than 2 percent of government IT security personnel fall into a category he labels hunters and toolmakers: those with deep knowledge to identify vulnerabilities.