NY Attorney General: Cryptocurrency exchanges lack security, fairness, and...
Cryptocurrency exchanges may not be as safe as we first thought. A report from the state of New York’s attorney general has revealed that most exchanges do not have basic consumer protections in...
View ArticleTenable Research discloses Peekaboo vulnerability affecting video surveillance
Hackers have proven capable of staging a hijack of surveillance camera footage. Security hounds are calling the zero day vulnerability Peekaboo. In brief, certain internet-connected surveillance...
View Article鼻子解锁手机、充电宝窃取数据,这是一堂生动的网络安全课
以前经常听到,上大学就是提前适应社会、适应职场。大学本身是一种浓缩型的社会形态,人际社交、生活模式都有很类似的地方,好处在于大学生活有很高的容错率,可能还会有重新再来的机会。但对于现如今的学生来说,有一个无形的世界是没有办法提前实习的――网络安全。...
View ArticleMaking Risk Count: Winning Strategies from Global CISOs
A little over sixty years ago, Risk ―arguably the elder statesman of popular strategy board games―was introduced. Much like the role of today’s security professionals, excelling at the game of Risk...
View ArticleNew LiDAR-Driven Security Solution Offers Innovative Way to Secure Sensitive...
Security experts and technology companies debut solution for more capable and cost-effective perimeter security SUNNYVALE, Calif. (BUSINESS WIRE) #lidar ― Quanergy , a leading manufacturer of LiDAR...
View ArticleThe best password advice right now
Ever since NIST submitted SP 800-63 Digital Identity Guidelines for review a few years ago, the computer security world has been debating the agency's newest recommended password policies, which run...
View Article品质×成就×创新丨WitAwards 2018年度品牌影响力评选「报名进行中」
近年来,全球的信息安全行业迎来高速发展期,市场规模不断扩大,各色企业犹如雨后春笋一般,安全行业也进入了百家争鸣的状态。在各个厂商提升产品、技术的同时,如何围绕安全产品与服务,让品牌价值深入用户观念,才是赢得挑战的关键因素。 WitAwards 2018...
View ArticleEuropol cyber crime report highlights emerging threats to enterprise security
Ransomware attacks are becoming more targeted and less opportunistic, Europol has found, while warning enterprises of the threat posed by new and emerging forms of cyber attack. Ransomware is now a...
View ArticleState of the Internet Security Credential Stuffing
Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to...
View Article中国信通院发布《区块链安全白皮书-技术应用篇》(附白皮书)
要点: 1.对于区块链技术的发展和应用态势,白皮书指出,目前全球区块链技术的应用已初步形成了包含硬件和基础设施、底层技术、上层应用和安全服务在内的技术生态格局。面对频频发生的安全事件,各国对区块链的态度也逐渐趋于理性,开始在政策、标准、技术等不同层面寻求应对之策。...
View ArticleLifeShield Home Security Advantage review: The whole is considerably less...
LifeShield, which was part of DirecTV from 2013 to 2017, is now an independent operation. As such, it has gone all-in on home security as a service. You’re not buying a home security system here,...
View ArticleBrandPost: Security and the Cloud Go Hand-in-Hand: Are You Prepared?
Just because you’ve tapped into the vast resources of a cloud service provider to replace previously on-premises IT assets doesn’t lessen your management or cybersecurity burden. In fact, cloud...
View ArticleBolstering Digital Workspace Security with Workspace ONE Trust Network
Sep 19, 2018 Author: Sachin Sharma Sachin Sharma is a senior product line marketing manager for VMware’s End-User Computing business unit, specializing in security. Share This Post On Four new...
View ArticleHow do you explain the unreasonable effectiveness of cloud security?
With the enormous attack surface of cloud providers like AWS, Azure, and GCP, why aren't there moresecurity problems? Data breaches and cyber attacks occur daily . How do you explain the unreasonable...
View ArticleHow AI Transforms Traditional Industries and Builds New Ones
When a championship player of Go, considered by many to be the world’s most complex board game, was defeated on his home turf by an AI-powered machine last year, many feared for what the defeat might...
View ArticleOptions for Analyzing Cyber Threats
Gene Spafford , a leading security industry expert and a professor at Purdue University, is someone we should all be thankful for cyber information-wise, at least. He birthed the idea of cyber...
View ArticleICANN sets plan to reinforce Internet DNS security
In a few months, the Internet will be a more secure place. That’s because the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the...
View ArticleWebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct. The Internet began without an identity layer and...
View ArticleCentrify Brings Zero Trust Security to Apple Devices with Day-One Support for...
Centrify continues long-standing tradition of delivering day-one support for macOS and iOS releases SANTA CLARA, Calif. (BUSINESS WIRE) Centrify , a leading provider of Zero Trust Security through the...
View ArticleNewEgg cracked in breach, hosted card-stealing code within its own checkout
The popular computer and electronics Web retailer NewEgg has apparently been hit by the same payment-data-stealing attackers who targeted TicketMaster UK andBritish Airways. The attackers, referred to...
View Article