BlackBerry warns of TIFF-based BES vulnerability

BlackBerry has recently issued a warning that enterprise servers could be remotely accessed when they process images in a TIFF format. Attackers would need to craft a specific web page and get someone with sufficient privileges to click on a link to that page on their BlackBerry. Alternatively, they could send an e-mail or ...

Continue Reading →
0

Obama Signs Executive Order on Cybersecurity

Executive Order on Cybersecurity

Obama Moves to Defend Infrastructure From Cyberattacks

WASHINGTON – Warning that cyberattacks pose a danger to US security, President Barack Obama signed an executive order on Tuesday designed to better protect critical infrastructure from computer hackers.

Obama, in his annual State of the Union speech to a joint session of the US Congress, said the United States is facing a “rapidly growing ...

Continue Reading →
0

FBI turns up heat in hunt for Stuxnet leakers

US federal investigators are applying pressure on senior government officials suspected of leaking details about the US government’s role in developing the Stuxnet malware, according to a report by the Washington Post.

The FBI and US prosecutors are analysing email accounts and phone records as well as interviewing current and former officials in a search to find links to journalists, according to the report on Saturday.

The investigation is likely to centre on a small circle of senior officials, given the highly classified nature of the ...

Continue Reading →
0

Pentagon to boost cybersecurity force

By , Published: January 28
The Pentagon has approved a major expansion of its cybersecurity force over the next several years,
increasing its size more than fivefold to bolster the nation’s ability to defend critical computer systems
and conduct offensive computer operations against foreign adversaries, according to U.S. officials.
The move, requested by the head of the Defense Department’s Cyber Command, is part of an effort to turn an organization that has focused largely on defensive measures into the equivalent ...
Continue Reading →
0

Health-care sector vulnerable to hackers, researchers say

By , Published: December 26

As the health-care industry rushed onto the Internet in search of efficiencies and improved care in recent years, it has exposed a wide array of vulnerable hospital computers and medical devices to hacking, according to documents and interviews.

Security researchers warn that intruders could exploit known gaps to steal patients’ records for use in identity theft schemes and even launch disruptive attacks that could shut down critical hospital systems.

A ...

Continue Reading →
0

The Five Key Benefits of Application Control and How to Achieve Them

Introduction
Employees are increasingly turning to web-based or web-enabled applications to help get their jobs done.
To combat the risks associated with these applications, one of the most significant evolutions in network security over the last few years has been the advent of application control.

This technology gives administrators visibility and control over each application that is allowed to communicate on the network.
This paper discusses the five key advantages of implementing application control; breaks down the misperception that application control can only ...

Continue Reading →
0

Your Organization Has Just Been Attacked by Malware – Now What?

Effective Malware Response Requires Visibility and Control Across the Entire IT Environment and Along the Full Threat Lifecycle.

In this business we must ask ourselves every day, “Are we prepared in the event of a malware attack?” Many believe the answer is “No.”

According to ESG Research’s U.S. Advanced Persistent Threat Analysis, November 2011, 77 percent of enterprise organizations will increase security spending in response to advanced malware and targeted attacks like Advanced Persistent Threats (APTs). These sophisticated threats can take any organization ...

Continue Reading →
1

Microsoft: Most PCs running pirated Windows in China have security issues

Microsoft finds widespread piracy in PCs sold in China,

IDG News Service – Microsoft launched a new anti-piracy campaign in China to highlight the security risks of buying counterfeit software.

In a recent investigation, Microsoft purchased 169 PCs from shops in China and found that all were installed with pirated versions of Windows, with 91% of them containing malware or deliberate security vulnerabilities.

“What we are finding is that increasingly cybercriminals are targeting both businesses and consumers right here in China,” said ...

Continue Reading →
0

94% of Hospitals Suffered Data Breaches

According to a recent study sponsored by ID Experts on patient and data security, 94% of healthcare organizations surveyed said they have suffered at least one data breach. This figure, the report says, demonstrates that uphill battle that the healthcare industry faces when it comes to information security. Further, the study says that such security problems cost healthcare organizations an estimated $7 billion annually.

Patient Data SecurityIn addition to the 94% that ...

Continue Reading →
0

The South Carolina Data Breach: A Lesson in Deaf and Blind Cybersecurity

Last week, South Carolina’s (SC) Governor presented the results of the investigation over the exposure of the personal data of nearly 4 million individual filers and 700,000 businesses in the SC Department of Revenue (DoR) data breach.

The investigation provided a detailed timeline of the breach and revealed that data protection in the DoR was lacking to the extent that the DoR had almost no visibility to the attack. The damning results have even led to the resignation of SC’s DoR director. Recently, the state made the ...

Continue Reading →
0
Page 7 of 11 «...56789...»