Kaspersky Lab to Host CyberStarts Boston on September 20
Inaugural event aims to empower the next generation of cybersecurity professionals BOSTON (BUSINESS WIRE) #boston ― Kaspersky , a global cybersecurity company, is hosting CyberStarts , a free, one-day...
View ArticleAWS Security For Beginners | Cloud Tips
AWS security is a complicated topic, and security should be one of the top priorities in every IT environment. The cloud actually makes it easier to be secure as long, as people keep best practices in...
View Article私信通:保障数据通信安全,打造隐私聊天工具
在国家“十三五”规划中,明确将保障数据信息安全和信息技术变革作为未来重点发展方向。“互联网+”已经上升为国家战略层面,互联网与传统产业的深度融合,使得操作系统更加复杂,各种数据海量增长,新情况新问题层出不穷,网络数据安全和用户信息安全问题将更加突出。...
View ArticleThe Netgear Arlo Q security camera is within dollars of its all-time low today
Indoor security cameras come in all shapes and sizes, and generally you get what you pay for. Unless you can get a killer deal like the one we found today. Amazon is selling the Netgear Arlo Q for...
View ArticleSuperdrug to “Hackers”: No Evidence You’ve Pwned Our Systems
Add to favorites Fortunately the credit card details of customers don’t appear to be held to ransom at this stage High Street chain Superdrug says there is no evidence that its systems have been...
View ArticleGetting To The Root Of Security With Trusted Silicon
The increasinglydistributed nature of computing and the rapid growth in the number of the small connected devices that make up the Internet of Things (IoT) are combining with trends like the rise of...
View Article‘Legacy system’ exposed Black Hat 2018 attendees’ contact information
A “legacy system” was to blame for exposing the contact information of attendees of this year’s Black Hat security conference. Colorado-based pen tester and security researcher who goes by the handle...
View ArticleLessons in Resilience: A Conversation on Security at REdeploy 2018
I spent last week out in San Francisco at REdeploy to learn about Resilience Engineering and what it means to build solid, sustainable infrastructures, organizations, and teams. This was the first...
View ArticleElasticsearch Audit Trail and Log File Filter Policies Explained
This post provides a thorough overview of the audit functionality of an Elasticsearch cluster. It defines some audit trail concepts, clarifies some implementation decisions and delves into some of the...
View ArticlePicking Apart Remcos Botnet-In-A-Box
This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions from Eric Kuhla and Lilia Gonzalez Medina . Overview Cisco Talos has recently observed multiple campaigns using...
View ArticleCode42 Forensic File Search on Exhibit at VMworld 2018
Accelerates incident response by delivering comprehensive answers to challenging data security questions in near real time MINNEAPOLIS (BUSINESS WIRE) #VMworld ― Code42 , a leading data security...
View ArticleCisco smells a RAT in Breaking Security's Remcos tool
Cisco Talos says criminals are using one research company's testing tools to set up and run botnets. A report released Wednesday by Talos researchers found that Breaking Security's Remcos remote...
View ArticleReview: The Barracuda Web Application Firewall 460 Offers Affordable Security
A business’s size offers little protection against network threats today. Hackers will target a small business just as readily as they will a larger organization, and may even see it as a softer...
View ArticleHow’s that Security Back Door Doing? (Part 2)
In the first part of this blog post I wrote about how recursive DNS (rDNS) is an attack surface that many enterprises don’t currently protect. Bad actors are exploiting that fact and developing...
View ArticleBrandPost: Listen to Your Customers and Make Security a Priority
As hackers wreak havoc on corporations such as Macy’s, Delta, Orbitz, and Chipotle, consumer interest in application security is growing exponentially. These days, web and mobile applications account...
View ArticleBrandPost: Get Peace of Mind with Verification
Partnering with a certified secure vendor helps ensure code is free of security-related defects―and shows you’ve made security a priority. Lost revenue, legal liabilities, diminished market share,...
View ArticleResearchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities
With an OS design based on a verified microkernel, researchers contend almost all linux OS flaws could be mitigated to less than critical severity. In an exhaustive study of critical Linux...
View Article2018年软件安全漏洞数量和严重性创下历史新高
Gartner在 2018年新技术成熟度曲线报告 中“冷落”了信息安全,但是根据Risk Based Security的最新报告,今年迄今为止披露的创纪录的10,644个漏洞中有近17%属于高危级别的严重漏洞,企业和个人面临的安全威胁与日俱增。 对于那些希望从软件补丁修补中获得喘息的组织来说,目前看起来似乎没有什么缓解的迹象。今天发布的Risk Based...
View ArticleTurla backdoors compromise European government foreign offices
ESET researchers tracking a notorious backdoor and cyberespionage campaign have warned that the list of government victims is far longer than previously thought -- and at least two new European offices...
View Article