Network Security

Network Security news, information, and how-to advice

usb drive
staples store

obama credit

Obama signs Executive Order to bolster federal credit card security

On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged...

poodle at play

Dreaded SSLv3 bug no monster, only a POODLE

On Tuesday, Google's Bodo Möller, along with fellow researchers Thai Duong and Krzysztof Kotowicz, disclosed the existence of a vulnerability in SSLv3, which allows the plaintext of secure connections to be calculated by an attacker...

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

Hong Kong democracy activist websites compromised

The attacks are suspected to be aimed at compromising activists

kmart storefront

Kmart discloses malware related data breach

On the same day that Dairy Queen announced their own malware-based data breach, Kmart (owned by Sears Holdings Corp.) reported the discovery that credit and debit cards were compromised after criminals installed malware on their...

symantec logo

Analysts react to Symantec split announcement

On Thursday, Symantec said that it would separate into two business units; one that focuses entirely on security, while the other sticks to information management. Symantec's announcement follows similar ones from Hewlett-Packard and...

dairy queen grill chill sign

Dairy Queen confirms Backoff malware led to data breach

On Thursday, the Minneapolis-based Dairy Queen confirmed a data breach that impacts 395 stores. The fast food chain says that the source of the breach itself is the same family of POS malware that gained attention earlier this summer...

Russian faces more charges in point-of-sale hacking case

Roman Valeryevich Seleznev has been charged with 11 counts of wire fraud

Phishing for passwords.

What to do in the aftermath of the JPMorgan breach

The compromise of 10s of millions of JPMorgan Chase accounts poses the greatest risk of phishing attacks on consumers and small businesses, experts say.

jpmorgan

JPMorgan says breach impacted 76M households and 7M small businesses

On Thursday, JPMorgan Chase (JPMC) updated investors about their recently disclosed data breach in an 8-K filing with the Securities and Exchange Commission. The incident impacts 76M households and 7M small businesses.

shellshocked3

Shellshock attackers targeting NAS devices

Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.

Threat Intelligence firm mistakes research for nation-state attack

A Bloomberg story, backed by data collected by threat intelligence firm, ThreatStream, mistakenly identified scans by a security researcher as a nation-state attack. According to the data, Chattanooga, TN is second only to Beijing in...

5 horror movies that scare security pros

Image by DreamworksHere are five iconic movies whose plot lines might be adapted to strike fear into the heart of today's tech professionals. The horror movie genre has given us some great classics through the years, but for IT...

Hong Kong protest

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

White Apple logo on storefront

Apple publishes patch for Shellshock vulnerability

On Monday, Apple released three patches to address vulnerabilities in GNU Bash, commonly known as Shellshock, that if exploited could allow an attacker to execute commands on the targeted host.

shellshocked bash bug

Six key defenses against Shellshock attacks

The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.

Number 2 on my top 10 list for security executives: Reform

There are a number of reforms that can be used to act as a carrot instead of a stick. Reform need not be regulatory mandates that are operationalized as reports used for placating auditors. Examples of ways the federal government can...

Two scenarios that would make OS X vulnerable to the Shellshock bug

Intego has seen some proof-of-concept exploits for OS X using Bash

Load More