Latest posts

Page 8

Most vulnerable operating systems and applications in 2014

An average of 19 vulnerabilities per day were reported in 2014, according to the data from the National Vulnerability Database (NVD). In this article, I look at some of the trends and key findings for 2014 based on the NVD’s database.

Continue reading

Kaspersky Labs reports on unprecedented cyber robbery

The details were revealed this week in a report from Kaspersky Labs, which first got involved in tracking down how the attacks were happening back in 2013 when an automatic teller machine in Kiev was compromised in a high profile incident in which the ATM began to dispense money without any user action.

Continue reading

23 ways to be the IT department’s MacGyver

Here is a list of things you may want to keep nearby so that you too can pull off a “MacGyver”.

Continue reading

The Secret Question Threat

At its core, security is all about allowing convenient access to a system for all those who have legitimate access to it. Yet, at the same time, that convenience, in turn, also creates security risks.

Continue reading

February 2015 – Microsoft Patch Tuesday

Of the nine security updates that were issued today, there are four remote code execution vulnerabilities, two security feature bypasses, and one escalation of privilege and Information disclosure. Only three of the nine are classified as critical; the rest are rated important.

Continue reading

Is there a severity greater than critical?

It’s Patch Tuesday again and it’s really time you paid attention. A lot of attention. MS15-011 covers a security issue that, were I in charge of the ratings names, I would rate as Super-critical – because of the potential for exploitation more than its potential impact. If you have anyone taking a domain-joined workstation outside the corporate network, patch it now.

Continue reading

61 network security twitter feeds to follow

Information security pros abound on Twitter. While not all of their tweets may be 100% focused on InfoSec, we’ve picked 61 network security Twitter feeds we think are worth following.

Continue reading

Introducing GFI LanGuard 2015

GFI LanGuard is available today. Product manager Cristian Florian tells us what’s new in the latest release

Continue reading

Software vulnerabilities: Only half the story

Intermediary devices such as routers and WAPs can be targeted by attackers. The latest example is an exploit that takes aim at a security vulnerability in routers made by a number of popular vendors, including D-Link, ZTE and TP-Link.

Continue reading

SMS for business gets the message across [Infographic]

According to statistics in a recent report by SAP, 74 percent of adults use SMS on a regular basis, and 64 percent said they believe businesses should make more use of SMS to interact with their customers.

Continue reading