Top

Category: Security


Monitoring&Analysis, Security

Are you being tracked through a Bluetooth security vulnerability?

August 16, 2019

Via: CSO

Research published this month by a team from Boston University has revealed a number of flaws in the way that Bluetooth Low Energy functionality is implemented on a wide range of consumer devices. These devices – including both Apple and […]


Monitoring&Analysis, Security

Beware rogue email rules and forms

August 15, 2019

Via: CSO

Most rich email clients (Outlook, Apple, Office 365, Gmail or Mozilla Thunderbird) allow users and developers to automate tasks based on incoming or outgoing emails. Actions allowed by some of the email clients are far more sophistication than others, although […]


Monitoring&Analysis, Security

12 things every computer security pro should know

August 14, 2019

Via: CSO

Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. Last year that number was a gob smacking 16,555. That’s like springing 13-45 new leaks […]


Monitoring&Analysis, Security

Cybersecurity for Federal Networks: It All Starts with Visibility

August 13, 2019

Via: Cisco Blog

A configuration mistake or purposeful mis-configuration is no joke. But it does illustrate how a misconfigured network can quickly become a security event (or it may already be one and your team does not know it). But how do you […]


Monitoring&Analysis, Security

ICS security: Popular building management system vulnerable to takeover

August 13, 2019

Via: CSO

Security researchers found a remotely exploitable critical vulnerability in a building management system used by businesses, hospitals, factories and other organizations to control things like ventilation, temperature, humidity, air pressure, lighting, secure doors and more. The vendor has released a […]


Monitoring&Analysis, Security

Review: How Perimeter 81 provides a near plug-and-play network security service

August 13, 2019

Via: CSO

The ways that most people and organizations use computers has radically changed over the past couple decades. Most work is no longer done inside traditional offices. Desktop computers are less popular than laptops, tablets, smartphones and other portable devices. And […]


Monitoring&Analysis, Security

Smishing and vishing: How these cyber attacks work and how to prevent them

August 9, 2019

Via: CSO

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. […]


Analysis, Monitoring&Analysis, Security

Preparation Requires Prioritizing Threats

August 8, 2019

Via: CSO

As the attack methods and strategies of our cyber adversaries continue to expand, organizations must stay ahead of those threats most likely to affect individual networks and connected resources. According to Fortinet’s most recent global Threat Landscape Report, not only […]


Analysis, Monitoring&Analysis, Security

11 new state privacy and security laws explained: Is your business ready?

August 8, 2019

Via: CSO

While at the federal level security and privacy legislation are lost in a morass of partisan politics and corporate lobbying delays, states have been moving ahead to push through an impressive number of important bills that help fill in the […]


Hardware, Monitoring&Analysis, Security

New Spectre-like CPU vulnerability bypasses existing defenses

August 7, 2019

Via: CSO

Security researchers have found a new way to abuse the speculative execution mechanism of modern CPUs to break security boundaries and leak the contents of kernel memory. The new technique abuses a system instruction called SWAPGS and can bypass mitigations […]