Quantcast
Last updated on April 18, 2014 at 21:21 EDT

Latest Attack Stories

2014-02-26 23:23:25

Free, Cloud-Based Vulnerability Management Service Improves Security for Small and Medium-Sized Businesses San Francisco, CA (PRWEB) February 26, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today debuted Tripwire® SecureScan™, a free, cloud-based vulnerability management service for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management – a widely recognized...

2014-02-24 23:00:22

Event simulates cyber attack of a fictional company in front of more than 300 executives and law enforcement and other cyber security professional. Atlanta (PRWEB) February 25, 2014 The Technology Association of Georgia (TAG) in partnership with the TAG Information Security Society announced today that it will host its 2014 Cyber Security Simulation on Tuesday, February 25th at the Clay National Guard Center in Marietta, Ga., which will also be presented via live stream to locations...

2014-02-24 08:33:08

Company to share best practices and innovative technologies for dramatically improved threat detection, network forensics and incident response ATLANTA, Feb. 24, 2014 /PRNewswire/ -- RSA CONFERENCE -- Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a...

Attack On US Veterans Website May Have Targeted Military Personnel
2014-02-14 10:34:29

Peter Suciu for redOrbit.com - Your Universe Online On Tuesday security researchers identified a zero-day exploit (CVE-2014-0322) that had been served up from the US Veterans of Foreign Wars (VFW) website. This attack reportedly targeted American military personnel during this week’s paralyzing snowstorm at the United States Capitol. Researchers at FireEye believe that those behind this attack, which may have also been coordinated to take place in advance of the Presidents' Day...

2014-02-04 08:21:36

ARLINGTON, Va., Feb. 4, 2014 /PRNewswire/ -- Lunarline today announced the results of a three month pilot program designed to drive down the cost of security assessments, including FedRAMP-accreditation, DIACAP, FISMA compliance and penetration testing. Using the Vulnerability Scan Converter (VSC) - a tool developed by Lunarline's Products Team - Lunarline was able to reduce the cost of some security assessments by nearly 1/3(rd) over the three month pilot period. (Logo:...

New UMich Formula Predicts Perfect Moment For Hackers To Strike
2014-01-15 09:50:01

[ Watch the Video: New Model For Predicting Cyberattacks ] Brett Smith for redOrbit.com - Your Universe Online The timing of a cyber-attack is crucial to overcoming measures designed to defend or repel the attacks and a new study from researchers at the University of Michigan has revealed a mathematical model that could be used to optimize the timing of would-be hackers. In the study, which was published in the Proceedings of the National Academy of Sciences (PNAS), the research team...

2014-01-09 23:22:16

Siemens rapid, proactive response ensures timely delivery of firmware patch. Seattle, Washington, US (PRWEB) January 09, 2014 IOActive, Inc., the leading global provider of specialist information security services, announced today that it has uncovered multiple vulnerabilities in Siemens’ SCALANCE X-200 Switch Family. These Ethernet switches are used to connect to Industrial Control Systems (ICS) components like Programmable Logic Controllers (PLCs) and Human Machine Interfaces (HMIs)....

2014-01-06 12:31:44

Light Cyber's MAGNA detected breaches from new Bitcoin mining malware some four days before the campaign became widely known, proving the system's superiority in detecting and containing breaches from unknown malware early in the attack life cycle RAMAT GAN, Israel, January 6, 2014 /PRNewswire/ -- Light Cyber (http://www.lightcyber.com), an emerging provider of innovative Predictive Breach Detection solutions, today announced that its customer-installed MAGNA appliances were...

2013-12-17 08:34:51

IT workplace security risks outlined in Fifth Annual State of the Endpoint Study Commissioned by Lumension SCOTTSDALE, Ariz., Dec. 17, 2013 /PRNewswire/ -- While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to the fifth annual State of the Endpoint study conducted by Ponemon Institute and commissioned by Lumension(®), a global leader in endpoint management and security....

2013-11-27 23:03:34

Download sample information security policy templates today from myinformationsecuritypolicy.com, industry leaders offering high-quality, professionally researched and written security policies, procedures, and much more. Contained in an easy-to-use and edit security manual, the sample information security policy templates are essential for today’s growing regulatory compliance laws. Dallas, TX (PRWEB) November 27, 2013 Download sample information security policy templates today from...