Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets. This eBook looks at key dependencies among critical infrastructure...
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
When you're a hacker, time is on your side. Time to find a soft spot in your armor, to evade defenses, to seek out your most critical data. Increasingly, today's advanced threats circumvent traditional defenses - even sandboxing. You need a new approach. This SlashGuide white paper helps you understand advanced...
A new survey from IDG Research Services tells the story: most organizations lack confidence in the ability of their security defenses to keep them safe. In fact, more than half said 100% security is a pipe dream. This summary by Network World lays out the facts but also presents an approach to detect malware and...
US-CERT warns that all Linux distributions should be immediately updated to patch "GHOST," a serious security vulnerability. Attackers could exploit the bug to remotely seize control of a system.
Here you go - As folks tender a transaction with their card with any retailer or online provider, the card data enters a complicated payment ecosystem where devices and applications of differing levels of security are entrusted to ensure that payments reach the intended party and are not compromised.
Download this...
The FBI has issued an alert about a "Business E-mail Compromise" fraud scam targeting businesses that regularly make wire transfers to foreign companies. Experts offer mitigation insights.
Because of employees' increasing demands to use mobile devices at work, NIST's latest special publication provides organizations with a process to implement a mobile app vetting process.
The Federal Reserve on Jan. 26 revealed its roadmap for an overhaul of the U.S. payments system, which includes plans for faster settlement and a focus on improving payments security to reduce fraud.
The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.
Nearly a year after issuing a first draft, NIST has released a substantially revised proposal for changing the way it develops cryptographic standards. The effort was launched after the NSA was accused of tampering with a NIST cryptographic algorithm.
The Regin espionage and surveillance malware offers attackers advanced capabilities, but a new analysis of two recovered modules finds the components are basic and unveils potential clues to the identity of its creator.
Adobe confirms that a zero-day flaw exists in its Flash browser plug-in and promises to soon release Windows, Mac and Linux fixes for affected versions of Flash Player. The vulnerability is reportedly already being targeted by in-the-wild attacks.
The OpenSSL Heartbleed bug hasn't died, with recent scans still finding 250,000 Internet-connected systems that remain vulnerable. Security experts recommend enterprises expand their patching efforts to find devices with embedded firmware that contain the flaw.
Following summertime engineering team layoffs, Microsoft has botched two Windows fixes and failed to issue updates to address three Windows flaws that were spotted by Google, which the search giant revealed publicly 90 days after privately notifying Microsoft.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.