Microsoft, Amazon Top BEC's Favorite Brands

Uncategorized

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

Source: The Hacking News
Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks
Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world.

Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including

Uncategorized

Where Is the Consumer Outrage about Data Breaches?

Source: Dark Reading
Where Is the Consumer Outrage about Data Breaches?
Facebook, Equifax, Cambridge Analytica … Why do breaches of incomprehensible magnitude lead to a quick recovery for the businesses that lost or abused the data and such little lasting impact for the people whose information is stolen.

Uncategorized

5 Components to a Proactive Security Strategy

Source: Security Magazine
5 Components to a Proactive Security Strategy
Innovations in cloud and mobile technologies have created more opportunities than ever for employees to work remotely, using devices of their choosing. But the flexibility of technology heterogeneity in the workplace isn’t without risk. As data becomes more accessible across a growing range of devices, the attack surface area also grows wider, raising the possibility of a potential data breach.

Uncategorized

Web Security Stats Show XSS & Outdated Software Are Major Problems

Source: Darknet
Web Security Stats Show XSS & Outdated Software Are Major Problems
Web Security Stats Show XSS & Outdated Software Are Major Problems

Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.

Data-based stats like these, which are not based on surveys, can be pretty useful – at least to get a broad overview of what is going on. These statistics also serve a solid purpose – they help all developers, security professionals and anyone who works with web applications better understand what might be going wrong.

Read the rest of Web Security Stats Show XSS & Outdated Software Are Major Problems now! Only available at Darknet.

Uncategorized

Is Blockchain a Breakthrough Cybersecurity Solution?

Uncategorized

How to Make Informed Risk Management Decisions about What to Store in the Cloud

Source: Security Magazine
How to Make Informed Risk Management Decisions about What to Store in the Cloud
Are we asking enough questions about cloud security for organizations to make informed risk management decisions? With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud, according to Rightscale’s 2018 State of the Cloud Report. This begs the question of cloud security.

Uncategorized

Utilities, Energy Sector Attacked Mainly Via IT, Not ICS

Uncategorized

Four Years in Europe: Lessons in Cybersecurity

Uncategorized

Redefining the Role of a Cybersecurity Professional

Source: Security Magazine
Redefining the Role of a Cybersecurity Professional
The security industry is often viewed as a relatively new field that has exploded in the last decade. However, like most STEM fields, our security workforces often lag other industries in terms of drawing from a broad talent base. Many people find the security field intimidating – and Hollywood’s portrayal of the field does us no favors. What’s needed now is for security pros to be vocal and showcase the diversity of their skillset – this, in turn, will bring more diversity into the industry. Truly, we need creatives just as much as we need data scientists and hackers.

Uncategorized
%d bloggers like this: