Security Awareness

Security Awareness news, information, and how-to advice

dropbox phishing
poodle at play

Cisco advises users to lock down WebEx to prevent snooping

A security researcher found potentially sensitive meetings open for anyone to join

derbycon logo

Salted Hash: Live from DerbyCon (Update 2)

Salted Hash is on the road this weekend, taking in the sights and sounds of DerbyCon 4.0. This is the second update form the show, with additional bits of information on Shellshock, the vulnerability that's become all the rage here in...

derbycon logo

Salted Hash: Live from DerbyCon (Update 1)

Salted Hash is on the road this weekend, taking in the sights and sounds of DerbyCon 4.0. With dozens of talks over the next three days, more than a thousand people are expected to attend one of the fastest growing conferences in the...

Binary wireless traffic stream speeding down the street.

Recently introduced TLDs create new opportunities for criminals

Top-level domains are supposed to be a way to focus the Internet. In reality, they've become a boon for registrars, who use them as an up sell and a goldmine for criminals who use them to bypass defenses.

iphone6

Quick tips before you switch to a new iPhone

Millions of people are switching to the latest iPhone this week. But before you trade-up, here's some basic tips to help protect your new device, both at home and at the office.

bitcoin

Old CGI-PHP vulnerability used to spread Bitcoin botnet

In 2012, researchers discovered a flaw in some PHP builds that would enable a remote attacker to execute commands on the server, if PHP was configured as a CGI script (PHP-CGI) at the time. Now, it's being used again to propagate a...

SecuritySymbols

What the symbol you use for security reveals to the people around you

How to consider and select a better symbol to represent you and your approach to security

Hand held over flame

Successful Security Awareness programs hold employees' hands to the fire

Few CSOs and the people responsible for implementing awareness programs are aware of the impact that consequences have on the success of not just an awareness program, but on the entire security program.

nsa sign

Tech groups press Congress to pass USA Freedom Act

As Congress returned from summer recess Monday, several technology and civil rights groups quickly renewed their push for a bill that seeks to put curbs on the bulk collection of phone records and Internet data by the government.

Will bitcoin's creator be unmasked for $12,000?

The anonymous poster wants 25 bitcoins, about $12,000, for the information

People talking illustration

Social media remains an easily exploitable attack surface

Twitter, like every other social platform, has an interesting attack surface; one that criminals have been exploiting for years. The instant connection to information offered by those platforms can be turned against their users,...

City of London Police brings in Kaspersky to train officers to tackle cybercrime

The scheme will be extended into further UK services and large companies to help them deal with computer misuse crimes

security officer ciso

What are CISOs' top security concerns and strategies?

A recent report conducted by Wisegate and Scale Venture Partners sheds some light on the priorities of security executives, how they're innovating, and what they're doing to help businesses take smart risks

5 cool new security research breakthroughs

University and vendor researchers are congregating in San Diego this week at USENIX Security ’14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.

Phishing key

Why it is time to intensify employee education on phishing

Companies should consider intensifying employee training to combat the increasing craftiness of phishers who are working harder to obtain personal details on targets in order to trap them in scams.

hospitalcorridor
In Depth

Security incidents tracked on Radar of Seattle Hospital

Software simplifies compliance with HIPAA rules

security awareness

4 small business security lessons from real-life hacks

Recent cases of social engineering, DDoS attacks and domain-name theft have made headlines. Some stories had happy endings, but others didn't. Here are four tips for preventing these types of hacks from ruining your business.

welcometofla

Windows tech support scammers take root in the U.S.

Security company accuses Florida firm of mixing old and new tactics to dupe unwary consumers with fake infection anxieties

Load More