Check What Information Your Browser Leaks
Schneier on Security
SEPTEMBER 28, 2021
These two sites tell you what sorts of information you’re leaking from your browser. Uncategorized browsers leaks
Schneier on Security
SEPTEMBER 28, 2021
These two sites tell you what sorts of information you’re leaking from your browser. Uncategorized browsers leaks
Krebs on Security
SEPTEMBER 28, 2021
The new $30 AirTag tracking device from Apple has a feature that allows anyone who finds one of these tiny location beacons to scan it with a mobile phone and discover its owner’s phone number if the AirTag has been set to lost mode.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Lohrman on Security
SEPTEMBER 26, 2021
Marc Sokol shares a powerful case study on the benefits of cybersecurity convergence with physical security, an example of measuring risk reduction and other benefits to global enterprises
Troy Hunt
SEPTEMBER 25, 2021
5 years of weekly updates, wow. It's not like anything of much significance has happened in that time, right?! I've done these videos every single week without fail, through high and lows and no matter where I was in the world.
Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association
In this webinar, we have a great set of panelists who will take you through how Zero Data strategies can be used as part of a well-rounded compliance and security approach, and get you to market much sooner by also allowing for payment optimization. They’ll share how to grow your business faster and minimize costs for both security and compliance
Schneier on Security
OCTOBER 1, 2021
The Wall Street Journal is reporting on a baby’s death at an Alabama hospital in 2019, which they argue was a direct result of the ransomware attack the hospital was undergoing.
Krebs on Security
SEPTEMBER 29, 2021
In February, KrebsOnSecurity wrote about a novel cybercrime service that helped attackers intercept the one-time passwords (OTPs) that many websites require as a second authentication factor in addition to passwords.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
SEPTEMBER 29, 2021
Not all organizations have a team or even staffers who can focus solely on vulnerability management, says Trustwave
Schneier on Security
SEPTEMBER 27, 2021
Good article about the current state of cryptocurrency forensics. Uncategorized blockchain cryptocurrency forensics theft tracking
CyberSecurity Insiders
OCTOBER 1, 2021
This article was written by an independent guest author. As the threat landscape evolves faster than we can keep up with, organizations must be aware of the type of threats they may face.
Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies
Now that companies are slowly allowing employees to return to work at the office, it's time to re-evaluate your company’s posture towards privacy and security. Join Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies, for a discussion that will focus on compliance and the types of privacy and security measures your company should be aware of, as well as tips and methods for implementing these measures.
The Last Watchdog
SEPTEMBER 30, 2021
Most of us internet users are obviously familiar with CAPTCHAs: a challenge or test that is designed to filter out bots (automated programs) and only allow legitimate human users in. Related: How bots fuel ‘business logic’ hacking. The basic principle behind CAPTCHA is fairly simple: the test must be as difficult as possible (if not impossible) to solve by these bots, but at the same time it must be easy enough for human users not to hurt user experience.
Schneier on Security
SEPTEMBER 30, 2021
The NSA and CISA have released a document on how to harden your VPN. Uncategorized advanced persistent threats NSA VPN
CSO Magazine
SEPTEMBER 29, 2021
Two-factor authentication (2FA) has been widely adopted by online services over the past several years and turning it on is probably the best thing users can do for their online account security.
CyberSecurity Insiders
SEPTEMBER 30, 2021
This blog was written by an independent guest blogger. DevSecOps means countering threats at all stages of creating a software product. The DevSecOps process is impossible without securing the source code. In this article, I would like to talk about Static Application Security Testing (SAST).
Security Boulevard
SEPTEMBER 30, 2021
After a year spent managing increased business risks—including security, IT resiliency and cybersecurity concerns—business leaders need to adjust their mindset when it pertains to risk management and avoid the more traditional approach to crisis management and business continuity planning.
Dark Reading
OCTOBER 1, 2021
The concept of identity has been around for decades, yet authentication has not caught up to its advanced threats until now. Here are four ways to begin thinking differently about identity and authentication
CSO Magazine
SEPTEMBER 29, 2021
We are often told that the cloud is more secure than on-premises solutions. But is it really? Both are subject to similar risks and vulnerabilities, and the cloud can sometimes be more complicated than on-premises because of our unfamiliarity with deployment and patching.
CyberSecurity Insiders
OCTOBER 1, 2021
By: Steve Salinas, director of solutions marketing, Exabeam. Security teams are trained to take decisive action when an attacker is detected. Using specialized tools, technologies and processes, their biggest responsibility is to mitigate the impact of a breach.
Security Boulevard
OCTOBER 1, 2021
On September 21, 2021, the U.S. Treasury Department’s Office of Foreign Asset Control (OFAC) once again threatened sanctions against companies for paying ransom in the event that their data or systems were hijacked by hackers.
Tech Republic Security
SEPTEMBER 27, 2021
Commercially-available malware, with minimal modification, is behind attacks against the Indian government, says Cisco's Talos security research group
CSO Magazine
SEPTEMBER 27, 2021
Incident responders work much like police detectives or journalists, in search of the who, what, when, why and how of incidents before they can take steps to address problems.
CyberSecurity Insiders
SEPTEMBER 27, 2021
All these days we have seen western companies and governments blaming China for launching sophisticated cyber attacks that crippled the critical infrastructure such as supply from oil companies and meat distribution.
Dark Reading
SEPTEMBER 30, 2021
That's not admitting defeat. It's preparing for success
Security Affairs
SEPTEMBER 29, 2021
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet to be fixed. The security researcher Jose Rodriguez ( @VBarraquito ) discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8)
CSO Magazine
SEPTEMBER 30, 2021
CISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. You want the method to provide tight security without being too complicated, confusing, or onerous for end users.
CyberSecurity Insiders
SEPTEMBER 29, 2021
United States Senate has passed on a new resolution if/when approved will make it mandatory for owners of critical infrastructures to report cyber attacks within a time frame of 72 hours.
Dark Reading
SEPTEMBER 28, 2021
FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long investigation
Security Boulevard
SEPTEMBER 30, 2021
Wondering how to improve cybersecurity apps in the new reality of remote work? Discover several strategies to integrate with the goal to prevent cyber threats!
CSO Magazine
SEPTEMBER 29, 2021
Even though jobs in cybersecurity pay well, far fewer women go into the field than men. According to the 2020 (ISC)² Cybersecurity Workforce Study , gender disparities persist around the globe.
CyberSecurity Insiders
SEPTEMBER 29, 2021
Cybersecurity researchers have found vulnerability on iPhone’s Apple Pay and Visa payments feature that allows hackers to make fraudulent contactless payments without the knowledge of the owner.
Security Affairs
SEPTEMBER 27, 2021
Telegram is becoming an essential platform for cybercriminal activities, crooks use it but and sell any kind of stolen data and hacking tools.
Security Boulevard
SEPTEMBER 29, 2021
The ransomware economy is booming. Ransomware gangs are so successful that if cybercriminals were companies, some would be considered “unicorns.” Organized crime syndicates have taken over this highly lucrative extortion racket and are now running the ransomware economy at an industrial scale.
CSO Magazine
SEPTEMBER 30, 2021
Security researchers have recently seen a notorious cyberespionage group with ties to the Russian government deploy a new backdoor that's designed to hook into Active Directory Federation Services (AD FS) and steal configuration databases and security token certificates. [
CyberSecurity Insiders
SEPTEMBER 28, 2021
Introduction. Cybersecurity is a fast-moving space. In fact, it’s hard to think of a time that security has been moving more quickly.
Security Affairs
SEPTEMBER 25, 2021
The customer care and call center provider GSS has suffered a ransomware attack that crippled its systems and impacted its Spanish-speaking customers.
Let's personalize your content