News

keyboard user security
security code big data cyberespionage DDoS

arvay randy CISO University of Utah

University of Utah hires Randall Arvay as CISO

Arvay brings a strong cybersecurity, military and educational background to the chief information security officer role.

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

internet of things

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

robots

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.

f 16 fighting falcon

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.

ransomware

Failure to communicate helps ransomware prosper

Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.

owasp

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

threat ransomware response

Present and future ransomware tactics model the past

The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots.

iot security ts

Michael Raggo joins 802 Secure as chief security officer

Mobile and Internet of things security expert Mike Raggo will play a key role in product development.

mri scanner

Medical devices that could put you at security risk

You remember the talk about former Vice President Dick Cheney's pace maker being susceptible to hackers, but here is a list of some lesser known medical devices that can scare the life out of you.

wallet man money

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec.

20151028 verizon logo innovation center 100624637 orig

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

red onion layers

Microsoft adds another layer to the Windows 10 patching onion

A new update will occur monthly, or sometimes more often.

p1170405

Companion mobile app exposed Hyundai cars to potential hijacking

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock and start vehicles.

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

train rerailment bridge collapse

Cyber infrastructure: Too big to fail, and failing

Just about everybody – from enterprises to individuals – depend on cyber protection. They aren’t getting that much, according to the Atlantic Council’s Joshua Corman.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

Load More