The History Of Hacking – Timeline Of Hacking Techniques [Infographic]

Posted by:

cyber security - hacker preventionIf you think hackers get a bad rap, think about this……

The word “hacking” has become synonymous with ill doings and the amount of affected people might be the reason for that. The meanings of hacking are many and most are intended to describe the act of engaging in activities (such as programming or other media) ...

Read More →
0

Cybersecurity Threats – Don’t Forget Employees

Posted by:

Internal Threats Can Be Your Biggest Threat

The usual focus of cybersecurity efforts on external threats to an organization and its mission overlooks the central, powerful danger the inside threat.
Corporations dont take their internal security as seriously as they should, explains Alex McGeorge, senior security researcher at Florida-based Immunity, a provider of specialized offensive information technologies.

McGeorge goes on to emphasize the importance of protecting a corporation from internal threats, explaining, The attack surface inside ...

Read More →
0

Enterprise Penetration Testing In The Palm Of Your Hand

Posted by:

Pwnie Express Unveils Next Generation State-of-the-Art Pwn Phone 2014.

pwn phone penetration testingEarlier this week, Pwnie Express revealed the next generation of its  game-changing Pwn Phone, a cutting edge sleek phone that doubles as a powerful penetration testing device making it incredibly easy to evaluate wired, wireless and Bluetooth networks.

The leader in vulnerability assessment and penetration testing devices, the Pwn Phone 2014 is ...

Read More →
0

SEC Provides Guidance on CyberSecurity Exams

Posted by:

SEC Cybersecurity ExamsIn an April 15, 2014 Risk Alert, the U.S. Securities and Exchange Commission’s Office of Compliance Inspection and Examinations (OCIE) announced that it would conduct examinations of more than 50 registered broker-dealers and registered investment advisers, focusing on areas related to cybersecurity.

The OCIE Alert includes a sample request for information and documents that will be used in the initiative. This sample ...

Read More →
0

Is Dropbox Leaking Your Sensitive, Personal Information?

Posted by:

If you’re storing personal information in a cloud service like DropBox or Box, even Google Drive we have to ask, what are you thinking?  If you somehow have been convinced that these are secure platforms for sharing personal information you might think again after reading Graham Cluley’s piece below.

If you are using file-sharing systems like Dropbox and Box without proper care and attention, there is a risk that you could be unwittingly leaking your ...

Read More →
0

Covert Redirect Is Just a Flaw It’s Not Another Heartbleed

Posted by:

covert redirect is no heartbleedBut That Doesn’t Mean Its Not A Problem

On Friday, a PhD student at the Nanyang Technological University in Singapore, Wang Jing, published a report focused on a method of attack called “Covert Redirect,” promoting it as a vulnerability in OAuth 2.0 and OpenID. Yet Jing’s contention of security flaws in OAuth and OpenID has serious flaws of its own, according ...

Read More →
0

Microsoft Releases Patch For Zero Day Vulnerability (CVE-2014-1776) Including Patch For XP

Posted by:

LATEST INTERNET EXPLORER ZERO-DAY VULNERABILITY (CVE-2014-1776)IS IT SAFE YET?

Microsoft released a security update for its Internet Explorer browser Thursday to fix a the Zero-Day Vulnerability (CVE 2014-1776) for all versions of Windows including XP. This security update is rated Critical for Internet Explorer 6 (IE 6) thru 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6) thru Internet Explorer 11 (IE 11) on affected Windows ...

Read More →
0

Compliance: Why You Can’t Afford To Stay With Windows XP

Posted by:

Now that there has been a Zero Day vulnerability identified in IE that will NOT be patched in Windows XP, we have to ask, “what will it take to get you off XP?” Perhaps the fact that you will not be able to meet your compliance requirements will provide the push you need to upgrade.

Many companies, large and small, have relied on Windows XP for years, and it hasn’t been an issue for compliance. However, ...

Read More →
0

Fix For Internet Explorer Security Flaw – Zero-day Internet Explorer Vulnerability (CVE-2014-1776)

Posted by:

do not use ie

You Have 5 Options

As a follow up to our earlier post, Microsoft Internet Explorer Security Bug Could Impact Millions of Users, we wanted to share what we’ve found out so far with respect to a fix for the latest IE flaw.

As of April 28, 2014, Microsoft has not provided a ...

Read More →
0

Microsoft Internet Explorer Security Bug Could Impact Millions of Users

Posted by:

internet explorer security flaw

It’s A Good Time To Change Browsers

Just when you thought things were starting to cool down a little after the Heartbleed Bug, Microsoft issued a security advisory on Saturday warning users of a vulnerability in its Internet Explorer web browser that could allow malicious “remote code execution.”

The vulnerability affects all versions of the browser and, as of this writing, there ...

Read More →
0
Page 14 of 18 «...101213141516...»