As more enterprises adopt software-defined networking, hackers are finding the emerging technology to be a new route to penetrate organizations. Anthony Lim of (ISC)² recommends ways to secure SDNs against attacks.
It is hard to imagine the modern business without email. In 2012 alone, firms sent an estimated 89 billion emails per day. And that total could rise to more than 143 billion per day by 2017. Email-based attacks have long threatened organizations of all sizes. And as more users migrate to cloud-based "email as a...
Throughout 2014, cyber criminals expanded their potentially devastating attacks into many industries, including several that we had never before seen fall victim to a large number of threats. These threat actors have become increasingly sophisticated, using stealthy new tactics to move laterally and stay undetected...
In spite of the best efforts of the cyber security industry to protect computer networks, breaches still happen, causing millions of dollars in damage, tainting the reputation of corporations, and causing end users to lose confidence in the security of their personal information. Given that new reality, it's not...
Security researchers reported a zero-day bug to Microsoft - which has patched the flaw - after reverse-engineering details were contained in a bug hunter's sales pitch to hacked surveillance software vendor Hacking Team.
Consider for a moment the most vital operation in your enterprise. It might run financial processing around the world, control a city's electrical distribution, or handle
millions of passengers' airline reservations. What happens to your business if the computers directing such operations are hacked, sabotaged or...
Let's assume that your security operations are stellar. You have procedures in place to keep software patches up to date, and a team that responds to incidents within minutes. A relentless focus on security permeates your enterprise. In short, in-house you're doing everything right. But how about outside your...
Fundamental design flaws in ATMs have resulted in patchworks of compensatory controls to bolt on security for fighting malware and fraud. Leaders say security by design may need a push from industry and regulators.
Shed a tear for enthusiasts of aging Microsoft Windows operating systems. That's because Microsoft has now retired Windows Server 2003 support, as well as anti-virus scanner and signature updates for Windows XP. But breaking up can be hard to do.
In-the-wild attacks have been found targeting at least one of two new zero-day Flash flaws leaked by Hacking Team's hacker. Separately, cyber-espionage APT attackers have been targeting a new Java flaw.
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
EMV Here We Come. Now that the U.S. has finally embraced secure-in-person transactions with EMV, we'll examine how the transition and the rollout will affect the rate of card-not-present (CNP) fraud and other online transactions. Join our panelists as we discuss such topics as how fraudsters will exploit the CNP...
Without an iota of doubt one could say enterprises at large are fraught with the challenges of dealing with the multitude of common and advanced malware attacks. As a security professional you have been constantly grappling with challenges in identifying attacks, let alone spotting the most dangerous ones.
And the...
FBI Director James Comey says he has faith in American technological ingenuity to overcome obstacles and give law enforcement the ability to access and decrypt data on the devices of criminals and terrorists.
Warning: All versions of Flash Player are vulnerable to a zero-day, weaponized exploit that became public when Italian spyware vendor Hacking Team was hacked, and 400 GB of corporate data leaked. Adobe has released an update to patch the flaw.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.