5 years ago

8 Identity and Access Metrics To Manage Breach Risks

As 2015 stacks up to be yet another banner year for breaches and attacks against enterprises, one of the most common factors to devastating compromises is the attacker’s ability to move laterally through network resources and find ways to escalate privileges or abuse existing access.
5 years ago

Attribution Concerns Raised Over Cyber Sanctions Program

The recent executive order signed by President Obama establishing a sanctions program for overseas cyber-attackers gives the government a new tool to deter malicious attacks. The challenge lies in knowing who to punish, security experts warned.
5 years ago

DoS Vulnerabilities Patched in Cisco Unity Connection

Cisco has addressed several denial-of-service (DoS) vulnerabilities in Cisco Unity Connection, the company’s unified messaging platform.
5 years ago

Stuxnet Five Years Later: Did We Learn The Right Lesson?

No! That’s despite an abundance of best practices and standards that are shining light into the dark corners of industrial control system security.
5 years ago

Invizbox (hands-on): Another flawed Tor “privacy” router debuts

The Tor router runs on the same hardware as the failed Anonabox project, but with a more “honest” approach. The trouble is: honesty won’t keep your Internet activity private.
5 years ago

Like Google, Mozilla set to punish Chinese agency for certificate debacle

The Mozilla Foundation plans to reject new digital certificates issued by the China Internet Network Information Center (CNNIC) in its products, but will continue to trust certificates that already exist.
5 years ago

Emerging Threats Teams With IID on Threat Intelligence

Cyber threat intelligence firm IID announced this week that Emerging Threats, a provider of threat intelligence recently acquired by Proofpoint for $40 million, will make some of its data available via IID’s threat intelligence management system, ActiveTrust.
5 years ago

China Sharply Boosts Cyber Warfare Funding

China’s government is sharply increasing its investment in cyber warfare programs in what U.S. intelligence officials say is a major attempt to compete with superior U.S. military cyber capabilities.
5 years ago

Pin-pointing China’s attack against GitHub

The big question is attribution. Is this attack authorized by the Chinese government? Or is it the work of rogue hackers?
5 years ago

New U.S. sanctions treat hackers like terrorists

President Barack Obama said Wednesday that the U.S. will now treat foreign hackers and cyber spies like terrorists and nuclear arms dealers. He signed an executive order that would allow the U.S. to freeze their assets and bar them from entering the country. The new powers would address a weakness in policy that has allowed a small number of bad cyber actors abroad to be sheltered from American authorities.
5 years ago

Check Point to Acquire Lacoon Mobile Security

Network and data security firm Check Point Software Technologies (NADAQ:CHKP) said on Thursday that it would acquire Lacoon Mobile Security, a provider of enterprise security solutions for iOS and Android devices.
5 years ago

FURIOUS Google erects wall around Chinese root cert kingpins CNNIC

Google has announced it will no longer recognise the Chinese Internet Network Information Centre (CNNIC) as a Root Certificate Authority, following an investigation into unauthorised certificates issued for several Google domains.
5 years ago

Cybercrim told to cough up £1m or spend years in chokey

A cybercriminal from Thamesmead has been given six months to turn up £1m, or he’ll be spending another four years behind bars.
5 years ago

Midsized Companies, Supersized Network Security Needs

Small and midsized businesses (SMBs) are the engine of the recovering economy. According to recent U.S. government numbers, just over 60 percent of the U.S. private sector workforce is now employed by companies with fewer than 1,000 employees. Not only are SMBs significant employers, they are also among the earliest adopters of new technologies.
5 years ago

Tor Wants to Know How to Make the Darknet Mainstream

To bring services hidden by Tor out into the open where people will actually use them, Tor Project developers have outlined a two-step plan that will begin by soliciting users’ opinions on how to improve the hidden services. Then, to finance the actual work, they plan on starting a crowdfunding campaign.