by Liora |
Nov 18, 2014 6:02:29 PM |
0 Comments
The U.S. government may be thwarting thousands of daily attempts to penetrate its IT systems, but the number of successful attacks clearly is increasing, giving the appearance that the bad guys are winning at least a few battles, if not the war. Making matters worse, the security safeguards breached are roughly the same as those used by most U.S. businesses, noted Core Security's Eric Cowperthwaite.
read more
by Liora |
Nov 18, 2014 6:01:35 PM |
0 Comments
The Domain Generation Algorithm (DGA) used by a new variant of the Matsnu Trojan (also known as Trustezeb) relies on an interesting technique to avoid detection by security solutions.
read more
by Liora |
Nov 18, 2014 6:00:14 PM |
0 Comments
Domain generation algorithms have been botmasters’ favorite tool for keeping malware up and running—and for frustrating security researchers and detection technologies.
read more
In a blog post published in back in May, my colleague Doug McLean wrote that an enterprise’s attempt to find experienced, knowledgeable, and (reasonably) affordable Security Analysts these days is no longer a traditional human resource effort, but more like “searching for unicorns”.
read more
by Liora |
Nov 11, 2014 6:01:12 PM |
0 Comments
On-demand webinar: As cyber security breaches become a board-level priority, join us in learning how you can automate your breach detection system.
read more
by Liora |
Nov 7, 2014 5:56:29 PM |
0 Comments
US retailer Home Depot said it has traced the world’s second largest theft of credit card details from its systems back to a supplier’s compromised username and password.
read more
by Liora |
Nov 6, 2014 5:59:07 PM |
0 Comments
The proliferation of the Bugat trojan, also known as “Cridex,” put the threat among the top banking botnets last year – and now researchers warn that its so-called successor, “Dridex,” is targeting users via social engineering schemes.
read more
by Liora |
Nov 6, 2014 5:58:10 PM |
0 Comments
The birth of e-commerce dates to August 11, 1994 — the date when what was likely the first secure transaction over the World Wide Web occurred in Nashua, N.H.
read more
by Liora |
Oct 29, 2014 5:55:09 PM |
0 Comments
Determining whether a data dump on Pastebin or elsewhere online is legit can be time-consuming and resource-intensive. Deloitte & Touche offers tips for how to weed out the fake hacks.
read more
by Liora |
Oct 22, 2014 6:54:12 PM |
0 Comments
So far, the Staples breach appears to be small, affecting only 11 stores in Pennsylvania, New York and New Jersey.
Office supplies chain Staples acknowledged Tuesday it is investigating a potential breach involving credit cards used at some of its stores.
read more