Tag: Dark Reading:

Zero-Factor Authentication: Owning Our Data

Are you asking the right questions to determine how well your vendors will protect your data? Probably not.   Advertise on IT Security News. Read the complete article: Zero-Factor Authentication: Owning Our Data

44% of Security Threats Start in the Cloud

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud.   Advertise on IT Security News. Read the complete article: 44% of Security Threats Start in the Cloud

The Trouble with Free and Open Source Software

Insecure developer accounts, legacy software, and nonstandard naming schemes are major problems, Linux Foundation and Harvard study concludes.   Advertise on IT Security News. Read the complete article: The Trouble with Free and Open Source Software

Dell Sells RSA to Private Equity Firm for $2.1B

Deal with private equity entity Symphony Technology Group revealed one week before the security industry’s RSA Conference in San Francisco.   Advertise on IT Security News. Read the complete article: Dell Sells RSA to Private Equity Firm for $2.1B

Lumu to Emerge from Stealth at RSAC

The new company will focus on giving customers earlier indications of network and server compromise.   Advertise on IT Security News. Read the complete article: Lumu to Emerge from Stealth at RSAC

The Road(s) to Riches

You could be making millions in just two years!   Advertise on IT Security News. Read the complete article: The Road(s) to Riches

8 Things Users Do That Make Security Pros Miserable

When a user interacts with an enterprise system the result can be productivity or disaster. Here are 8 opportunities for the disaster side to win out over the productive.   Advertise on IT Security News. Read the complete article: 8…

DHS Warns of Cyber Heartbreak

Fraudulent dating and relationship apps and websites raise the risks for those seeking online romance on Valentine’s Day.   Advertise on IT Security News. Read the complete article: DHS Warns of Cyber Heartbreak

The 5 Love Languages of Cybersecurity

When it comes to building buy-in from the business, all cybersecurity needs is love — especially when it comes to communication.   Advertise on IT Security News. Read the complete article: The 5 Love Languages of Cybersecurity

Babel of IoT Authentication Poses Security Challenges

With more than 80 different schemes for authenticating devices either proposed or implemented, best practices and reference architectures are sorely needed, experts say.   Advertise on IT Security News. Read the complete article: Babel of IoT Authentication Poses Security Challenges

Huawei Charged with RICO Violations in Federal Court

A new set of indictments adds conspiracy to violate RICO statutes to a list of existing charges against the Chinese telecommunications giant.   Advertise on IT Security News. Read the complete article: Huawei Charged with RICO Violations in Federal Court

7 Tax Season Security Tips

Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.   Advertise on IT Security News. Read the complete article: 7 Tax Season Security Tips

Apps Remain Favorite Mobile Attack Vector

Mobile apps are used in nearly 80% of attacks targeting mobile devices, followed by network and operating system attacks.   Advertise on IT Security News. Read the complete article: Apps Remain Favorite Mobile Attack Vector

Avast Under Investigation by Czech Privacy Agency

The software security maker is suspected of selling data about more than 100 million users to companies including Google, Microsoft, and Home Depot.   Advertise on IT Security News. Read the complete article: Avast Under Investigation by Czech Privacy Agency

Stop Defending Everything

Instead, try prioritizing with the aid of a thorough asset inventory.   Advertise on IT Security News. Read the complete article: Stop Defending Everything

Chaos & Order: The Keys to Quantum-Proof Encryption

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up.   Advertise on IT Security News. Read the complete article: Chaos & Order:…

Chaos May Be the Key to Quantum-Proof Encryption

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.   Advertise on IT Security News. Read the complete article: Chaos May Be the Key to Quantum-Proof Encryption

Why Ransomware Will Soon Target the Cloud

As businesses’ daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.   Advertise on IT Security News. Read…

Macs See More Adware, Unwanted Apps Than PCs

The latest data from Malwarebytes show the average Mac sees almost twice as many bad apps as Windows systems, but actual malware continues to be scarce.   Advertise on IT Security News. Read the complete article: Macs See More Adware,…

China’s Military Behind 2017 Equifax Breach: DoJ

Four members of China’s People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.   Advertise on IT Security News. Read the complete article: China’s Military Behind 2017 Equifax Breach: DoJ

Unlocked S3 Bucket Lets 36,077 Jail Files Escape

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states’ correctional facilities.   Advertise on IT Security News. Read the complete article: Unlocked S3 Bucket Lets 36,077 Jail Files Escape

Unlocked S3 Bucket Lets 36,077 Prison Files Escape

The leaky repository belongs to JailCore, a cloud management and compliance platform used in several states’ correctional facilities.   Advertise on IT Security News. Read the complete article: Unlocked S3 Bucket Lets 36,077 Prison Files Escape

Day in the Life of a Bot

A typical workday for a bot, from its own point of view.   Advertise on IT Security News. Read the complete article: Day in the Life of a Bot

5 Measures to Harden Election Technology

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world’s most capable.   Advertise on IT Security News. Read the complete article: 5 Measures to Harden Election Technology

90% of CISOs Would Cut Pay for Better Work-Life Balance

Businesses receive $30,000 of ‘free’ CISO time as security leaders report job-related stress taking a toll on their health and relationships.   Advertise on IT Security News. Read the complete article: 90% of CISOs Would Cut Pay for Better Work-Life…

Phishing Personified

What makes these scams so completely obvious in the physical form?   Advertise on IT Security News. Read the complete article: Phishing Personified

A Matter of Trust

Has working in the cybersecurity industry affected your ability to trust? Take the poll now.   Advertise on IT Security News. Read the complete article: A Matter of Trust

Invisible Pixel Patterns Can Communicate Data Covertly

University researchers show that changing the brightness of monitor pixels can communicates data from air-gapped systems in a way not visible to human eyes.   Advertise on IT Security News. Read the complete article: Invisible Pixel Patterns Can Communicate Data…

How Can We Make Election Technology Secure?

In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.   Advertise on IT Security News. Read the complete article: How Can We Make Election Technology Secure?

RSAC Sets Finalists for Innovation Sandbox

The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.   Advertise on IT Security News. Read the complete article: RSAC Sets Finalists for Innovation Sandbox

Hiring Untapped Security Talent Can Transform the Industry

Cybersecurity needs unconventional hires to help lead the next phase of development and innovation, coupled with salaries that aren’t insulting   Advertise on IT Security News. Read the complete article: Hiring Untapped Security Talent Can Transform the Industry

7 Ways SMBs Can Secure Their Websites

Here’s what small and midsize businesses should consider when they decide it’s time to up their website security.   Advertise on IT Security News. Read the complete article: 7 Ways SMBs Can Secure Their Websites

Kubernetes Shows Built-in Weakness

A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.   Advertise on IT Security News. Read the complete article: Kubernetes Shows Built-in Weakness

Bad Certificate Knocks Teams Offline

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.   Advertise on IT Security News. Read the complete article: Bad Certificate Knocks Teams Offline

Bad Certificate Knocks Teams Off Line

Microsoft allowed a certificate to expire, knocking the Office 365 version of Teams offline for almost an entire day.   Advertise on IT Security News. Read the complete article: Bad Certificate Knocks Teams Off Line

EKANS Ransomware Raises Industrial-Control Worries

Although the ransomware is unsophisticated, the malware does show that some crypto-attackers are targeting certain industrial control products.   Advertise on IT Security News. Read the complete article: EKANS Ransomware Raises Industrial-Control Worries

C-Level & Studying for the CISSP

One CTO tells us about his belated pursuit of a foundational infosecurity certification — why he wanted it and what it took.   Advertise on IT Security News. Read the complete article: C-Level & Studying for the CISSP

Coronavirus Phishing Attack Infects US, UK Inboxes

Cybercriminals capitalize on fears of a global health emergency with phishing emails claiming to offer advice for protecting against coronavirus.   Advertise on IT Security News. Read the complete article: Coronavirus Phishing Attack Infects US, UK Inboxes

Ashley Madison Breach Returns with Extortion Campaign

The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach.   Advertise on IT Security News. Read the complete article: Ashley Madison Breach Returns with Extortion Campaign

Name That Toon: Private (Button) Eye

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.   Advertise on IT Security News. Read the complete article: Name That Toon: Private (Button) Eye

AppSec Concerns Drove 61% of Businesses to Change Applications

According to new Dark Reading research, some respondents have even left behind commercial off-the-shelf software and migrated to open-source or in-house homegrown applications. Click image to read more.   Advertise on IT Security News. Read the complete article: AppSec Concerns…