Trojans cause 80% of worldwide malware infections (Info Security Magazine)
When it comes to malware, the spawning rate of new threats does not appear to be slowing down at all: In the first quarter of 2013 alone, more than six and a half million new malware samples were...
View ArticleMedical identity theft to be explored at FTC hearing (SC Magazine)
The Federal Trade Commission next week will host a hearing examining identity theft affecting senior citizens, and a portion of the discussion will focus on the the rising rates and awareness of...
View ArticleSweet Password Security Strategy: Honeywords (Information Week)
To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to researchers at security firm RSA....
View ArticleIT’S NOT JUST ABOUT CHINA AND AMERICA—SMALLER COUNTRIES WANT TO WAGE CYBERWAR...
America's Department of Defense yesterday released its annual report on China’s military capabilities. The report includes “electronic warfare” and “information dominance” as part of a larger campaign...
View ArticleUS Department of Defense fingers China as top cyber threat (The Register)
Chinese gov't, military to blame for past attacks http://www.theregister.co.uk/2013/05/07/us_dod_china_warfare_report/
View Article10 Reasons SQL Injection Still Works (Dark Reading)
After all of these years, SQL injection vulnerabilities still stand as an old reliable for attackers seeking to break into corporate databases....
View ArticleData breaches loom in the face of business transformation (Info Security)
The move to cloud applications, ever-present mobility, Big Data and an escalating set of complex cyber-attack vectors and malware are all conspiring to overwhelm security professionals, leaving the...
View ArticleSenators introduce bill that would flag countries, products that benefit from...
A group of senators has responded to the widely broadcast threat of foreign cyber espionage with the introduction of new legislation that calls for the creation of a "watch list" of countries believed...
View ArticleWill 'Direct' Exchange Doom HIEs? (Healthcare Info Security)
Sizing Up the Impact of Secure Messaging Protocol http://www.healthcareinfosecurity.com/will-direct-exchange-doom-hies-a-5752
View ArticleBig Data Alchemy: Turn Info Into Money (Information Week)
Data markets could become a new market category. Here, companies buy, sell or trade data for mutual benefit....
View ArticleDealing with BYOD Security Risks (Redmond Magazine)
IT is now challenged with implementing personal device security procedures that keeps networks safe from infection and protects data from being lost or stolen....
View ArticleToo much infosec regulation undermines security, warns NAB (The Register)
Encouraging compliance discourages responses http://www.theregister.co.uk/2013/05/14/nab_warning_infosec_regulation/
View ArticleShould IT Security Be Professionalized? (Careers Info Security)
Panel Addresses Issues in Defining Cybersecurity http://www.careersinfosecurity.com/should-security-be-professionalized-a-5754
View ArticleUsing Big Data to Predict Attacks (Bank Info Security)
How Data Analysis Speeds Detection, Response http://www.bankinfosecurity.com/using-big-data-to-predict-attacks-a-5760
View ArticleWeb Application Testing Using Real-World Attacks (Dark Reading)
Using exploits to test Web applications can be an enlightening way to test for vulnerabilities, but there are downsides as well....
View Article
More Pages to Explore .....