Quantcast

Latest Attack Stories

2014-02-24 08:33:08

Company to share best practices and innovative technologies for dramatically improved threat detection, network forensics and incident response ATLANTA, Feb. 24, 2014 /PRNewswire/ -- RSA CONFERENCE -- Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a...

Attack On US Veterans Website May Have Targeted Military Personnel
2014-02-14 10:34:29

Peter Suciu for redOrbit.com - Your Universe Online On Tuesday security researchers identified a zero-day exploit (CVE-2014-0322) that had been served up from the US Veterans of Foreign Wars (VFW) website. This attack reportedly targeted American military personnel during this week’s paralyzing snowstorm at the United States Capitol. Researchers at FireEye believe that those behind this attack, which may have also been coordinated to take place in advance of the Presidents' Day...

2014-02-04 08:21:36

ARLINGTON, Va., Feb. 4, 2014 /PRNewswire/ -- Lunarline today announced the results of a three month pilot program designed to drive down the cost of security assessments, including FedRAMP-accreditation, DIACAP, FISMA compliance and penetration testing. Using the Vulnerability Scan Converter (VSC) - a tool developed by Lunarline's Products Team - Lunarline was able to reduce the cost of some security assessments by nearly 1/3(rd) over the three month pilot period. (Logo:...

New UMich Formula Predicts Perfect Moment For Hackers To Strike
2014-01-15 09:50:01

[ Watch the Video: New Model For Predicting Cyberattacks ] Brett Smith for redOrbit.com - Your Universe Online The timing of a cyber-attack is crucial to overcoming measures designed to defend or repel the attacks and a new study from researchers at the University of Michigan has revealed a mathematical model that could be used to optimize the timing of would-be hackers. In the study, which was published in the Proceedings of the National Academy of Sciences (PNAS), the research team...

2014-01-09 23:22:16

Siemens rapid, proactive response ensures timely delivery of firmware patch. Seattle, Washington, US (PRWEB) January 09, 2014 IOActive, Inc., the leading global provider of specialist information security services, announced today that it has uncovered multiple vulnerabilities in Siemens’ SCALANCE X-200 Switch Family. These Ethernet switches are used to connect to Industrial Control Systems (ICS) components like Programmable Logic Controllers (PLCs) and Human Machine Interfaces (HMIs)....

2014-01-06 12:31:44

Light Cyber's MAGNA detected breaches from new Bitcoin mining malware some four days before the campaign became widely known, proving the system's superiority in detecting and containing breaches from unknown malware early in the attack life cycle RAMAT GAN, Israel, January 6, 2014 /PRNewswire/ -- Light Cyber (http://www.lightcyber.com), an emerging provider of innovative Predictive Breach Detection solutions, today announced that its customer-installed MAGNA appliances were...

2013-11-27 23:03:34

Download sample information security policy templates today from myinformationsecuritypolicy.com, industry leaders offering high-quality, professionally researched and written security policies, procedures, and much more. Contained in an easy-to-use and edit security manual, the sample information security policy templates are essential for today’s growing regulatory compliance laws. Dallas, TX (PRWEB) November 27, 2013 Download sample information security policy templates today from...

2013-11-23 23:01:03

Download sample information security policy templates today from myinformationsecuritypolicy.com, industry leaders offering high-quality, professionally researched and written security policies, procedures, and much more. All contained in an easy-to-use and edit security manual, the sample information security policy templates are a must have for today’s growing regulatory compliance laws. Dallas, TX (PRWEB) November 23, 2013 Download sample information security policy templates today...

2013-11-18 23:31:02

Computers are becoming integrated with technology in all facets of life. National Computer Security Day provides companies and individuals the opportunity to assess the security of their technological surroundings. Seattle, WA (PRWEB) November 18, 2013 Rhino Security Labs, an industry leader in information security, announces vulnerability assessment opportunities as November 30th's National Computer Security Day approaches. In coordination with the annual event, Rhino Security Labs...


Word of the Day
omadhaun
  • A fool; a simpleton: a term of abuse common in Ireland and to a less extent in the Gaelic-speaking parts of Scotland.
This word is partly Irish in origin.