Posted on 22 April 2014. | Companies have pushed out a new version of the firmware that to close the backdoor. Only it didn't - it only hid it.
Posted on 18 April 2014. | The impact is huge: approximately 3 million payment cards were potentially compromised.
Posted on 17 April 2014. | At least 36% of SharePoint users are breaching security policies, and gaining access to sensitive and confidential information to which they are not entitled.
Posted on 16 April 2014. | A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.
Posted on 15 April 2014. | A new report takes a deeper look into the security of a number of the most popular programming languages including .Net, Java, ColdFusion, ASP and more.
Posted on 22 April 2014. | Members of the OpenBSD project have begun working on a free version of the SSL/TLS protocol. They are not starting from scratch, but have forked OpenSSL to create a new, more secure option which they have dubbed LibreSSL.
Posted on 22 April 2014. | HITRUST, in coordination with the U.S. Department of Health and Human Services, revealed the results of the healthcare industry’s first cyber attack simulation, CyberRX. Incident response coordination and collaboration capabilities are crucial.
Posted on 18 April 2014. | The biggest challenge for organizations is prioritizing, understanding and addressing vulnerabilities in a business context, according to an AlgoSec survey. Almost all respondents believe that business stakeholders should own the risk of their critical applications.
Posted on 17 April 2014. | Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.
Posted on 17 April 2014. | More effective collaboration between government and the infosec industry is crucial to protecting organizations from cyber threats. More work needs to be done to strengthen government’s position as a source of information on potential threats.