How to end a romance scam
There are a lot of grinches in the world. Since I wrote my first article on romance scams , I’ve received “please help” emails each week from the children or...
Despite Breaches, Many Organizations Struggle to Quantify...
Enterprises are struggling with familiar old security challenges as a result, new survey shows.
Universities Get Schooled by Hackers
Colleges and universities are prime targets for criminals due to huge sets of personal information and security that is weaker than in many businesses.
Friday Squid Blogging: More Problems with the Squid Emoji
Piling on from last week's post, the squid emoji's siphon is in the wrong place. As usual, you can also use this squid post to talk about the security storie...
Security Recruiter Directory
Looking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop. The recruiters listed below can help you find your ne...
Bomb Threat Bitcoin Demands Cause Disruption, Evacuations
An email campaign is demanding large sums of money in return for not blowing up schools, banks and businesses.
Cybercrime Is World's Biggest Criminal Growth Industry
The toll from cybercrime is expected to pass $6 trillion in the next three years, according to a new report.
Setting the Table for Effective Cybersecurity: 20 Culinar...
Even the best chefs will produce an inferior product if they begin with the wrong ingredients.
Grammarly Launches Public Bug Bounty Program
The online spell check platform is taking its private bounty program public in hopes of outing more threats.
Secure Critical Infrastructure Top of Mind for U.S.
Attacks targeting critical infrastructure system are ramping up - and defense has become a top priority for the U.S. government.
Google Beefs Up Android Key Security for Mobile Apps
Changes to how data is encrypted can help developers ward off data leakage and exfiltration.
Notebook/Security Lock by Belkin #C100/f8e504 Keep it Sa...
$5.50 End Date: Saturday Jan-12-2019 9:35:29 PST Buy It Now for only: $5.50 Buy It Now | Add to watch list
Ethical Hacking Growing In Popularity At Data Breaches In...
UK Whitehats Blacklisted By Cisco Talos
Shamoon Destroys Data At Italian Oil And Gas Company
Over Half Of Brazil's Population Exposed In Security Inci...
Education Gets an 'F' for Cybersecurity
The education sector falls last on a list analyzing the security posture of 17 US industries, SecurityScorecard reports.
Twitter says it receives half a million of spam reports p...
Twitter's latest Transparency Report also shows a rise in government requests for user data.
Strasbourg Manhunt Continues, China Arrests Second Canadi...
​​Authorities continue to search for the gunman suspected of opening fire on a French Christmas market, China arrests a second Canadian businessman, a shortf...
The Economics Fueling IoT (In)security
Attackers understand the profits that lie in the current lack of security. That must change.
Shamoon malware destroys data at Italian oil and gas company
About a tenth of Saipem's IT infrastructure infected with infamous data-wiping Shamoon malware.
Shamoon Reappears, Poised for a New Wiper Attack
One of the most destructive malware families ever seen is back, and researchers think its authors are gearing up to again take aim at the Middle East.
Information Security and IT Risk Management, by Agrawal, ...
$9.99 (0 Bids) End Date: Thursday Dec-20-2018 5:12:55 PST Buy It Now for only: $25.00 Buy It Now | Bid now | Add to watch list
Marriott Hack Reported as Chinese State-Sponsored
The New York Times and Reuters are reporting that China was behind the recent hack of Mariott Hotels. Note that this is still uncomfirmed, but interesting if...
Worst password offenders of 2018 exposed
Kanye West is the worst password offender of 2018, according to Dashlane. When visiting the White House, the famous rapper was sprotted unlocking his iPhone ...
IT Security Metrics : A Practical Framework for Measuring...
$38.44 End Date: Saturday Jan-12-2019 3:01:18 PST Buy It Now for only: $38.44 Buy It Now | Add to watch list
How to end a romance scam
There are a lot of grinches in the world. Since I wrote my first article on romance scams , I’ve received “please help” emails each week from the children or...
Leveraging AI and automation for successful DevSecOps
As engineering teams try to innovate at a faster pace, being able to maintain the quality, performance and security of the applications become much more impo...
AriseBank execs forced to pay $2.7 million to settle SEC ...
The organization claimed to operate a unique, decentralized bank via the blockchain.
A New Year’s Resolution: Security is Broken…Let’s Fix It
As we near the end of 2018, another wave of massive cyber-attacks has exposed personally identifiable information belonging to hundreds of millions of people...
Cybersecurity Tools That Every Business Should Consider i...
Businesses ignoring cyber security has become a thing of the past. With the sudden increase in cyber-attacks and data breaches, cybersecurity remains at the ...
Guidelines for assessing ISPs’ security measures in the c...
According to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all inte...
Can advancing cybersecurity techniques keep pace with new...
A look back through a volatile 2018 has seen the cyber security landscape move towards an even more complex picture. This has been driven by the increased vo...
Bug Hunting Is Cybersecurity’s Skill of the Future
The vast majority of white hat hackers who reported that they were looking for jobs in cybersecurity said that their bug hunting experience helped them land ...
AI Set to Supercharge Phishing in 2019
The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, acco...
Remotely controlled EV home chargers – the threats and vu...
There are lots of home charger vendors. Some of them, such as ABB or GE, are well-known brands, but some smaller companies have to add ‘bells and whistles’ t...
Friday Squid Blogging: Problems with the Squid Emoji
The Monterey Bay Aquarium has some problems with the squid emoji. As usual, you can also use this squid post to talk about the security stories in the news t...
WordPress plugs bug that led to Google indexing some user...
WordPress 5.0.1 also fixes seven security vulnerabilities.
Deception technology: Authenticity and why it matters
This article is the second in a five-part series being developed by Dr. Edward Amoroso in conjunction with the deception technology team from Attivo Networks...
Can advancing cybersecurity techniques keep pace with new...
A look back through a volatile 2018 has seen the cyber security landscape move towards an even more complex picture. This has been driven by the increased vo...
Leveraging AI and automation for successful DevSecOps
As engineering teams try to innovate at a faster pace, being able to maintain the quality, performance and security of the applications become much more impo...
Guidelines for assessing ISPs’ security measures in the c...
According to the EU’s net neutrality regulation, called the Open Internet Regulation, which came into force in 2016, internet providers should treat all inte...
Hacking democracy efforts continue with upticks in malwar...
Comodo Cybersecurity released its Global Threat Report 2018 Q3, offering insights from Comodo Threat Research Lab experts into key cyberthreat trends and the...
BlackBerry Makes Autonomous Vehicle Play
BlackBerry this week introduced its new Security Credential Management System. SCMS -- a free service for the public and private sectors -- could encourage e...
Pivot3 delivers policy-based security for hybrid cloud so...
Pivot3 revealed new policy-based security management capabilities in its Intelligence Engine. These expanded capabilities allow organizations to automate and...
Sysdig introduces new capabilities to secure Kubernetes-b...
Sysdig released new features for Sysdig Secure, part of the Sysdig Cloud-Native Intelligence Platform. The Sysdig platform is the unified platform that provi...
CISO’s mission resonates with healthcare peers
The vision of a standardized method to assess the risk management posture of third party suppliers to healthcare firms envisioned by the recently-formed Prov...
Worst Password Blunders of 2018 Hit Organizations East an...
Good password practices remain elusive as Dashlane's latest list of the worst password blunders can attest.
Bug allowed full takeover of Samsung user accounts
Samsung awards researcher a $13,300 reward for finding three CSRF issues on its user portal.
Rhode Island sues Google after latest Google+ API leak
Google sued within a day after announcing latest Google+ API leak.
Powered by Feed Informer