The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

THURSDAY, AUGUST 25, 2016

Featured

Archives

Latest Comments

Social Networks

From microscopic entry-points (see the flawed chip endangering industrial systems), to macroscopic dangers (such as vulnerable/corrupted networks or wireless vulnerabilities), cyber threats count on attention slips to make their way in. And attention slips are inherently human.

Read more ...

Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too. One maker of Android malware is using Twitter to communicate with infected smartphones, according to security firm ESET. The company discovered the feature in a malicious app called Android/Twitoor. It runs as a backdoor […]

Read more ...

There is now a practical, relatively fast attack on 64-bit block ciphers that lets attackers recover authentication cookies and other credentials from HTTPS-protected sessions, a pair of French researchers said. Legacy ciphers Triple-DES and Blowfish need to go the way of the broken RC4 cipher: Deprecated and disabled everywhere. Dubbed Sweet32, researchers were able to […]

Read more ...

While most IT and security leaders believe that application security problems are inherently more risky than network security issues, appsec still doesn’t get near the same kind of executive support and technical visibility that network security does, a new study out this week by Ponemon Institute shows. Fortunately, new trends in IT delivery like DevOps […]

Read more ...

To many financially motivated cybercriminals, one of the most valuable commodities is data. But not all data is valued equally. They want data that is fresh, good quality and easily monetized. For credit cards and prepaid cards this translates into low balances and high credit limits or card values. For healthcare data it means health […]

Read more ...