Many organizations now see encryption first and foremost as a countermeasure against data breach falloutRead More
Many organizations now see encryption first and foremost as a countermeasure against data breach fallout
This year marks another one of those anniversaries that we would rather not be celebrating; mobile malware is ten years old. In 2004 a proof of concept, known as Cabir, was delivered by a coder known as Vallez, a member of the 29A group of virus writers. It didn’t take long for this original proof…Read More
As I get ready to attend this year’s IBM Pulse conference (February 23-26 in Las Vegas), where I’ll be delivering a keynote session on how organizations can better use actionable intelligence in their efforts to deal with targeted attacks, I ask myself why traditional security is not as effective as it should be in dealing…Read More
DNS reflection amplification is still the most popular DDoS tactic, but attackers are increasingly exploring alternatives.
Users should more carefully weigh risk against reward when using public Wi-Fi networks
2014 has seen a steady cadence of major breaches in the news. Unfortunately, this falls directly in line with one of our major threat predictions made in Q4 2013. Government, retail, financial, healthcare and even medical equipment manufacturing companies have been in the cross hairs of targeted attacks. The ratio of companies being breached by…Read More
When there’s a major cybersecurity threat facing the financial services industry, members of that industry come together and share information through the Financial Service Information Sharing and Analysis Center (FS-ISAC). When there’s a major cybersecurity threat facing the health care sector, members of that sector come together and share information through the National Health Information…Read More
The emergence of wearable devices and biometrics could mean the end of password-based authentication.
I said in September 2013 that the security situation around Java 6 had gotten much worse. In our recently released 2013 Annual Threat Roundup one thing we looked into is the current state of attacks against Java vulnerabilities. What we see in that report confirms that as of the end of 2013, the Java 6…Read More