A list of "super user" passwords - and a default username - now circulating online appears to allow unauthorized access to some webcam video streams, security researchers warn. If confirmed, it would be yet another massive internet of things security failure by a device manufacturer.
Despite significant investments in the signature-based defenses of today's network, email and endpoint security solutions, since 2010, these solutions have been ineffective against the sheer volume of evolving malware. Security and risk professionals have turned to automated malware analysis (AMA) for help. These...
As defense stategies become stronger year after year, it seems as though the prevalence of malware is growing proportionately, projected to exceed $2 trillion by 2019 - a four-fold increase in the cost of security breaches over 2015.Posing a threat to every industry, profession, and company, malware not only...
As the New Year unfolds, finding a breach prevention provider will be critical in order to safeguard an organization's assets. NSS Labs subjected nine cybersecurity market leaders to comprehensive, rigorous testing to determine how well each product handled current advanced threats and attack methods. All vendor...
In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
U.K. Chancellor Philip Hammond used the launch of Britain's new five-year National Cyber Security Strategy to trumpet the country's strike-back capabilities. But other parts of the strategy - including more automated defenses - hold much greater promise.
The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
Cisco has patched another zero-day flaw stemming from the Shadow Brokers' leak of Equation Group tools and attack code. The technology giant warns that attackers have been exploiting the vulnerability.
All in the family: A "sophisticated attacker" alert from US-CERT, urging enterprises to lock down their networking gear, was triggered by the leak of exploit tools - targeting, in part, U.S.-built networking gear - that may have been tied to the NSA.
Data centers are difficult to defend, and securing the perimeter is important but of little consequence if attackers get inside. But there are ways to lock down data centers, former White House strategist Nathaniel Gleicher explains in this interview.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
Cisco has begun releasing updates for all ASA devices to patch them against a buffer overflow vulnerability that was targeted by leaked Equation Group attack tools. Attackers can exploit the flaw to gain remote control of ASA devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.