by Liora |
Oct 16, 2014 6:51:22 PM |
0 Comments
Aviv Raff knows a thing or two about cybersecurity. He’s chief technology officer at Seculert, which specializes in helping companies detect and stop sophisticated cyber attacks. In the wake of recent megabreaches such as the one at JPMorgan Chase (JPM), where hackers compromised personal information of some 76 million households, or Home Depot (HD), where the digital intruders got at about 56 million credit and debit card numbers, Raff says no one can afford to be complacent about digital safety. “Awareness is definitely rising, but there are people out there who still think it might not happen to them,” he says. “Everyone is at risk of being compromised.”
read more
by Liora |
Oct 15, 2014 6:50:09 PM |
0 Comments
There's yet another Internet bug that threatens to make your private conversations public. The new enemy: "Poodle" attacks.
read more
by Liora |
Oct 9, 2014 6:49:02 PM |
0 Comments
Keep it small, move to the Valley, and reap big returns.
read more
by Liora |
Oct 6, 2014 6:47:43 PM |
0 Comments
In the early hours of the Shellshock vulnerability in Bash, the running joke was that Windows administrators could sit back with a box of popcorn and a beverage and watch the Linux and UNIX admins scramble about for once.
read more
by Liora |
Sep 25, 2014 6:45:08 PM |
0 Comments
Yet another point-of-sale (POS) breach at a major retail chain, and the victim adds encryption.
read more
by Liora |
Sep 23, 2014 6:42:59 PM |
0 Comments
When the source code for Tinba – a banker trojan comprised of 20 KB of code – was made public in July 2014, there was speculation among security professionals that a new version of the malware could make an appearance with some new features.
read more
by Liora |
Sep 19, 2014 6:44:17 PM |
0 Comments
Goodwill was the victim of a cyber-attack that lasted for 18 months before it was detected. CK Systems, a hosting provider that processed payment cards for Goodwill Industries, had intruders accessing their network from Feb. 10, 2013 until August 14, 2014. The length of this attack is seemingly outrageous, but this is a common problem when it comes to cybercrime.
read more
by Liora |
Sep 11, 2014 6:41:49 PM |
0 Comments
Two Chinese cyber espionage gangs known for targeting very different industries and working out of different regions of the nation actually use some of the same or similar tactics, tools, and resources in their spying operations, researchers found.
read more
by Liora |
Sep 2, 2014 6:40:12 PM |
0 Comments
Big Data is altering the way organizations must manage their overall IT assets and resources, reports Karen Epper Hoffman.
read more
by Liora |
Aug 28, 2014 6:39:04 PM |
0 Comments
Citing an unnamed U.S. government official and other anonymous sources briefed by U.S. law enforcement, Bloomberg reported on Wednesday that JPMorgan Chase, as well as at least four other financial institutions, have been hacked.
read more