Security News > 2017 > May

Nature vs Nurture - Is Bad Cybersecurity in Our DNA? (Security Week)
2017-05-31 14:35

Einstein is often quoted as having said that insanity is doing the same thing again and again and expecting a different result. When it comes to cybersecurity, based on that definition, we must...

Spear-Phishing Attacks Increasingly Focused: Report (Security Week)
2017-05-31 14:15

Spear-phishing attacks have become increasingly “laser-focused,” with many campaigns aimed at only a small number of inboxes belonging to the targeted organization, according to a report published...

Balancing act: Ensuring compliance with GDPR and US regulations (Help Net Security)
2017-05-31 14:00

The impending GDPR, which will go into effect in a little less than a year from now, is going to have a significant impact on enterprise cybersecurity and data governance policies and practices...

Making Life Harder for Cyber Threat Actors (InfoRiskToday)
2017-05-31 13:33

As the adversaries develop new methods to strike at increasingly vulnerable digital infrastructures, it is time businesses take a hard look at the way defense is approached and recast security...

Analyzing phishing attacks against 500,000 mailboxes at 100 organizations (Help Net Security)
2017-05-31 13:30

Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. In 2016 alone, the...

Enterprise Mobile Apps Expose Sensitive Data via Backend Systems (Security Week)
2017-05-31 13:26

Many of the applications installed on enterprise mobile devices expose potentially sensitive data by failing to properly secure the connection between the app and backend servers, enterprise...

Privacy Issue Fixed in Yopify Ecommerce Notification Plugin (Threatpost)
2017-05-31 13:05

Ecommerce sites using the Yopify plugin were leaking customers’ names, locations and purchases.

4 vectors transforming the security software market (Help Net Security)
2017-05-31 13:00

The security software market is undergoing a transformation due to four key developments, according to Gartner. The use of advanced analytics, expanded ecosystems, adoption of SaaS and managed...

Ethical Debate: OK to Pay Shadow Brokers For Exploit Dumps? (InfoRiskToday)
2017-05-31 12:33

Goal of Crowdfunding by Security Researchers is to Prevent Future WannaCrysTwo security researchers are attempting to crowdfund a monthly subscription fee to Shadow Brokers' monthly exploit dump...

Post-Quantum RSA (Schneier on Security)
2017-05-31 11:31

Interesting research on a version of RSA that is secure against a quantum computer: Post-quantum RSA Daniel J. Bernstein, Nadia Heninger, Paul Lou, and Luke Valenta Abstract: This paper proposes...