Cybercrooks fight over DDoS attack resources
As more groups get into the denial-of-service attack business they’re starting to get in each other’s way
Cybercrooks fight over DDoS attack resources Read More »
As more groups get into the denial-of-service attack business they’re starting to get in each other’s way
Cybercrooks fight over DDoS attack resources Read More »
The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent of U.S. desktop ad impressions sold through programmatic advertising networks are fraudulen…
Ad network takes steps to reduce fraud Read More »
The average amount of a ransomware demand has increased from $294 in 2015 to $1,077 last year, according to a report released last week by Symantec.”That’s a pretty dramatic increase,” said Kevin Haley, director of security response at Symantec.Acco…
Report: Average ransomware demand now over $1,000 Read More »
Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to crack.That includ…
Automated mitigation on endpoint devices and networks can be tricky Read More »
The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use — if they have already laid the required ground work.The main prob…
Security automation is maturing, but many firms not ready for adoption Read More »
The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if the industry is able to address its data problem.One area where cyber insurance has already made an …
How the insurance industry could change the game for security Read More »
The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs.To ma…
Latest OWASP Top 10 looks at APIs, web apps Read More »
Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of atta…
Cyberespionage, ransomware big gainers in new Verizon breach report Read More »
The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest people available, no matter where they are from, but there is also a severe shortage of infosec professionals.
Cybersecurity industry braces for tighter visa rules Read More »
According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher — 81 percent said they should share sensitive, c…
Most employees willing to share sensitive information, survey says Read More »
The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning.Meanwhile, consumer-grade platforms like AOL Instant Messenger and Yahoo IM have fallen out of favor, while …
Report: Cybercriminals prefer Skype, Jabber, and ICQ Read More »
By the time John Kronick became a data security strategist a few years ago, he’d already been in the security industry for 20 years. But he didn’t come to security from IT.To read this article in full or to leave a comment, please click here(Insider St…
What it takes to become a data security strategist Read More »
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better, attackers are finding ways to get around them. Many defensive systems need to be tuned, or tune themselves, in order to appropriately respond to possible threats. Smoke alarms that go
Hackers get around AI with flooding, poisoning and social engineering Read More »
Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with incident reports to zero in on cases of actual ongoing infiltration.
Ac…
Deception technology grows and evolves Read More »
It’s free, easier to use than ever, IT staffers know it and love it, and it has fewer viruses and Trojans than Windows. It’s already ubiquitous on the server side. Plus, there are now alternatives to the most popular software packages out there — again, for free — and new software releases often have Web-based
Why Linux is a desktop flop Read More »