Phishing as an attack vector is nearly old as the Internet, spearphishing (targeting individuals via individually crafted emails meant to fool them into revealing information or downloading spyware) has been a favored attack technique for a good decade, and targeting…
Researchers have found a new way to attack the SHA-1 hashing algorithm, still used to sign almost one in three SSL certificates that secure major websites, making it more urgent than ever to retire it, they said Thursday. SHA-1 is…
Internet of things means different things to different people; self-driving cars, smart cities, connected homes, health and fitness apps, etc. But for security professionals, IoT will become a safety issue. Christian Byrnes That’s the stark assessment of analyst Christian Byrnes,…
If all you read are all of the headlines (and there are too many, to be sure) you’d be convinced enterprises are losing the never-ending battle to secure their networks. Perhaps they are. And to help turn the momentum, more…
Once upon a time, the biggest barrier to cloud adoption was security. That is no longer the case, but at the Re:Invent conference, Amazon.com unveiled two new security and compliance tools designed to make it easier for Amazon Web Services…
A targeted attack against Outlook Web Application (OWA) illustrates how far adversaries will go to establish persistent control over the organization’s entire network. As seen in recent breaches, attackers typically use stolen credentials or malware to get a foothold on…
The average U.S. company of 1,000 employees or more spends $15 million a year battling cyber crime, up 20 percent compared to last year, according to a report released today. Attacks involving malicious code, malware, viruses, worms, trojans, and botnets…
The recent spate of data breaches at major U.S. organizations has raised questions about how effective current security tools and approaches are when it comes to dealing with emerging threats. Private and public enterprises have spent tens of billions of…
Only in the computer security world would I get taken to task for saying the defenses you apply should be directly related to the threats you face. That’s exactly what happened after I posted “The No. 1 problem with computer…
Windows still owns the mainstream business PC market, but Apple’s decent toehold on the enterprise market — $25 billion annually, according to CEO Tim Cook — will only grow. You almost certainly already have Macs in your business, connecting to…