Internet Security

Internet Security | News, how-tos, features, reviews, and videos

cloud data warehouse

Ransomware prevalent in cloud-based malware

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to a report released today

Trusting the Social Security Administration?

The US Social Security Administration does a poor job of computer security. Surprised?

gap stretching

Insurers working to fill cyberinsurance data gaps

Insurers are starting to expand their services to better educate their customers about cyber risk and even help them defend against attacks before they happen and deal with the fallout of when a breach does occur

logitech wireless keyboard

Many popular wireless keyboards completely unprotected

Many popular wireless keyboards on the market today use no encryption at all and are vulnerable to eavesdropping, according to a new report.

There’s finally reason to hope in the war against ransomware

Now when ransomware tries to take over your computer, there’s something you can do besides pay up: stop it, buy more time to deal with it or mitigate the damage it might do, Security BSides Boston conference was told.

merger

Merging firms appealing targets for attackers

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according to a new report from Digital Shadows.

27% of US office workers would sell their passwords

In a survey released today, 27 percent of U.S. office workers at large companies would sell their work password to an outsider, compared to a global average of 20 percent

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known...

verizon sign

Verizon releases first-ever data breach digest with security case studies

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study

data security

SD-WAN startup Versa software defines security

Adds DNS, secure Web gateway to VNF roster, boost performance of existing offerings

rubiks globe

Study finds that anti-crypto laws won't work on an international stage

If the U.S. government restricts the export of encryption technology, or mandates back doors in U.S.-made encryption products, then both legitimate customers as well as criminals and terrorists can easily switch to encryption products...

power grid electrical

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.

KILL

Security pros worried about stolen credentials, alert volumes

The majority of security organizations received more alerts than they can handle and don't have a way to spot stolen credentials, according to a survey released today.

phishing money

PhishMe report shows employees can become assets in anti-phishing battle

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect phishing emails with practice, and can be trained to forward them to...

world privacy

Firms expect fines, new costs from Safe Harbor changes

In a new Ovum survey of IT decision makers at international companies, 70 percent said they expect to increase spending next year, 66 percent expect to have to make changes in their European business strategy, and 52 percent expect to...

cloud security ts

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

Cloud

Cisco SDN user plans OpenStack integration

Cloud provider merging ACI's network fabric with open source storage and compute framework

guitartuningmain

OpenDNS listens for malicious melodies

Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns of the Internet as a whole in order to spot patterns of malicious activity.

vintage robot toys windup

New ad-fraud botnet targets major corporations, universities

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.

welding

Exploit kit activity up 75 percent in third quarter 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to the same period last year, based on DNS activity, according to the latest edition of...

Load More