Security News

Vegan and BeEF clash shows how cyber arms race never stops (Help Net Security)
2015-06-26 12:25

Cyber attackers and defenders are caught in a permanent to-and-fro dance, coming up with new solutions that break the last one created by their adversaries. An example of this never-ending arms ra...

NSA and GCHQ Attacked Antivirus Companies (Schneier on Security)
2015-06-26 11:59

On Monday, the Intercept published a new story from the Snowden documents: The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored...

Facebook slowly fine-tuning its popular ThreatExchange (Help Net Security)
2015-06-26 10:43

Facebook's ThreatExchange, which was unveiled this February, is apparently a hit with organizations, and they are vocal about the ways they believe it could be improved. Fine-tuning a system like t...

Cisco finds, removes more default SSH keys on its software (Help Net Security)
2015-06-26 08:32

Cisco has pushed out security updates to address two vulnerabilities in its Web Security Virtual Appliance (WSAv), Email Security Virtual Appliance (ESAv), and Content Security Management Virtual Appl...

How companies can regain consumer trust after a data breach (Help Net Security)
2015-06-26 08:27

Americans have strong feelings about data breach notification, with 84 percent stating that the best way a company can regain their trust after a breach occurs is to notify them right away and provide...

Energy security pros: More competent, or just naive? (Help Net Security)
2015-06-26 07:23

Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less than one week. A sur...

The cloud, FedRAMP and FISMA compliance (Help Net Security)
2015-06-26 06:26

Many federal agencies and government contractors are migrating to cloud-based computing, a trend that will pick up speed as the cloud becomes more efficient, more affordable, and more secure. In fact,...

How to survive a compliance audit (Help Net Security)
2015-06-26 06:20

Ipswitch polled 313 IT professionals in United States with 59 percent noting that they were not fully prepared to undergo an audit. Additionally, 75 percent of respondents lacked confidence that colle...

Default SSH Key Found in Many Cisco Security Appliances (Threatpost)
2015-06-25 19:02

Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses.

Samsung Program Disables Windows Update on PCs (Threatpost)
2015-06-25 18:01

Samsung's update mechanism for Windows PCs and laptops silently disables Windows Update, computing enthusiast Patrick Barker has discovered.