How to Secure 'Permissioned' Blockchains
At the heart of every blockchain is a protocol that agrees to the order and security of transactions in the next block. Here's how to maintain the integrity of the chain.
OMG: Mirai Botnet Finds New Life, Again
The Mirai botnet refuses to die. This time, it has spawned a new bot called OMG, which Fortinet researchers have seen in the wild, and it's turning IoT devices into proxy servers.
Virtual Private Networks: Why Their Days Are Numbered
Partner Perspectives | 2/28/2018 | As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether.
GDPR: The New Price We Pay for Data Privacy
Simon Marshall | 2/28/2018 | When the EU's GDPR regulations come into effect in May, the rules around how companies and individuals regard data privacy will change forever. Even for those outside Europe, this could be an expensive journey to take.
Security Starts with the User Experience
Preventing a data breach is safer and more cost-effective than dealing with a breach after it has already happened. That means a focus on security in the design phase.
Misleading Cyber Foes with Deception Technology
Partner Perspectives | 2/27/2018 | Today's deception products go far beyond the traditional honeypot by catching attackers while they are chasing down non-existent targets inside your networks.
US Government Leads World in Data Breaches
US government agencies are leading the world when it comes to data breaches, and the issue seems to be getting worse, according to a new report. However, a shift to cloud may help alleviate some problems.
Security Liability in an 'Assume Breach' World
Partner Perspectives | 2/22/2018 | Cybersecurity today is more than an IT issue. It's a product quality issue, a customer service issue, an operational issue, and an executive issue. Here's why.
Coldroot RAT Sends Mac Antivirus Down a Maze
A new blog by a Digita Security researchers finds that Coldroot RAT, which specifically targets Mac and macOS users, is still eluding detection from different antivirus engines, even though it's available on GitHub.
Getting Started with IoT Security in Healthcare
Partner Perspectives | 2/21/2018 | There’s a hazard that comes with introducing any new element into patient care whether it's a new drug or a connected device. These four steps will help keep patients safe.
Cryptocurrency Crime: The Internet's New Wild West
Simon Marshall | 2/20/2018 | The popularity of Bitcoin and other cryptocurrencies has opened the floodgates to different cybercrimes, scams and outright theft. A pair of reports from Cisco and Digital Shadows paints a portrait of this new Wild West of the Internet.
DDoS Today: No Safety Inside the Perimeter
Naim Falandino | 2/19/2018 | For years, protecting the perimeter was believed to be the safest way to guard against DDoS. However, the cloud, IoT and new botnets have changed that thinking. Here's how CISOs and security pros should respond.
UK Accuses Russia of Launching NotPetya Attacks
Dawn Kawamoto | 2/16/2018 | The Kremlin and the Russian military used the NotPetya ransomware attack to target Ukrainian financial, energy and government centers, according to allegations the UK government made this week.
Kaspersky: Phishing Attack Attempts Soared 59% in 2017
Dawn Kawamoto | 2/15/2018 | There has been dramatic, year-over-year growth in phishing attacks, following only a slight increase in 2016 and a two-digit decline in 2015, according to a report released by Kaspersky Lab.
Mobile Malware Increases, While Hiding in Porn Sites
Simon Marshall | 2/15/2018 | Porn and other adult content sites are helping to disguise an increase in mobile malware, which is targeting users embarrassed by their online browsing habits, according to new information from Kaspersky Labs.
The Mirai Botnet Is Attacking Again…
Partner Perspectives | 2/15/2018 | And the spinoff bots — and all their command and control hostnames buried in the morass of digital data — are hilarious.
The GDPR Clock Is Running Out. Now What?
Partner Perspectives | 2/14/2018 | Many organizations impacted by new European Union data privacy rules that go into effect May 25 are still blind to some of the basics.
Forcepoint Finds New Malware Hiding in PoS Machines
The malware, which resembles a LogMeIn service pack, can capture data from credit cards and then reproduce the card or other information. However, Forcepoint believes this strain of malware is still under development.
|