Latest News

Information Security Professionals can Aid Business Understand Cyber Risk

Information Security Professionals can Aid Business Understand Cyber Risk

The UK government’s latest National Cyber Security Strategy requires businesses to have a detailed understanding of the risks to their information systems and raise standards to mitigate them. The challenge comes as businesses are becoming increasingly reliant on digital and online systems, making it all the more difficult to achieve a good understanding of cyber risks across the whole...

Router Vulnerabilities Disclosed in July Are Yet to be Fixed

Router Vulnerabilities Disclosed in July Are Yet to be Fixed

Details on serious vulnerabilities in a number of routers freely distributed by a major Thai ISP were published on Monday after private disclosures made to the vendors in July went unanswered. Researcher Pedro Ribeiro of Agile Information Security found accessible admin accounts and command injection vulnerabilities in ZyXel and Billion routers distributed by TrueOnline, Thailand’s largest...

Irish Teen Introduces qCript, a System Resistant to Quantum Computers

Irish Teen Introduces qCript, a System Resistant to Quantum Computers

Shane Curran, fifth year student at Terenure College introduced a project called “qCrypt,” a quantum-encrypted data storage solution that is resistant to quantum computers. The National Security Agency (NSA) previously published a memorandum on quantum computing last year, with an attempt to warn the general population of the threats that quantum computing has on encryption methods that are...

Ways to Outsource Security Services: Tips for Small Businesses

Ways to Outsource Security Services: Tips for Small Businesses

All the companies that actively use the internet are vulnerable to cyber-attacks and may face considerable risks and losses due to the frequent use of digital files and reliance on digital data. Due to the lack of possibilities to allocate substantial sums of money to address security issues, small-sized companies’ level of preparation is somewhat lower than that of big corporations. It may be...

The 17 Agencies that Form the U.S. Intelligence Community

The 17 Agencies that Form the U.S. Intelligence Community

What exactly is the “intelligence community?” It’s not just an amorphous term for all U.S. intelligence officials. It’s a veritable alphabet soup of 17 agencies and offices. The group includes agencies strictly focused on intelligence as well as the intelligence arms of other government agencies and of the military. Its total budget in 2015 was $66.8 billion. It includes: Office of...

DARPA Wants to Reproduce How Social Media Spreads Info Like Wildfire

DARPA Wants to Reproduce How Social Media Spreads Info Like Wildfire

When it comes to understanding which, what and how popular information travels the Internet, we have a lot to learn. That seems to be the idea behind a new program that the researchers at The Defense Advanced Research Projects Agency will unravel next month that aims to simulate the spread and evolution of online information. The goal of the program Computational Simulation of Online Social...

No More Ransomware?

No More Ransomware?

The No More Ransom Project is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security. It puts back-up at the top of their how-to prevent a ransomware attack list. The project recommends: “Have a recovery system in place so a ransomware infection can’t...

  • More at CSO
  • |
  • |
Enabling Two-Factor Authentication for Your Google Account

Enabling Two-Factor Authentication for Your Google Account

Two-factor authentication (which Google calls 2-step verification) is the use of a second step usually a single-use key or password along with a password to verify a user's identity. In Google's case the second step can come as a text message, a popup on your phone, through a Google Authenticator app, or from a series of printed single-use codes. It all starts by logging in to your Google...

Secret Details Unfold on Iran’s Cyber Army

Secret Details Unfold on Iran’s Cyber Army

A report by Al Arabiya has revealed the secrets of the Iranian electronic army and its intelligence and cyber activities against states and institutions. It also examines the details behind the murder of Mohammad Hussein Tajik, its former commander. Tajik was sacked from his post, detained and tortured over accusations of spying and leaking information to the opposition Green Movement inside...

The Meanest Ransomware Propagates Like a Meme

The Meanest Ransomware Propagates Like a Meme

There is a new malicious software called Popcorn Time and its purpose is to get the victim to collaborate with the cybercriminal to infect new users. It is particularly cruel because, aside from demanding a 1 bitcoin payment to return access to the encrypted files, the victim is offered the chance to recover the files for free if they contribute to its propagation. The victim will be able to...

Collibra Gets $50M at Reported $650M Valuation Led by ICONIQ

Collibra Gets $50M at Reported $650M Valuation Led by ICONIQ

Data governance and management startup Collibra originally founded in Belgium but now based out of New York to help businesses in sectors like finance and healthcare to manage and comply with data retention policies has raised $50 million in its latest round of funding. The Series C is being led by ICONIQ Capital, the somewhat under-the-radar firm that acts both as an investment fund and...

Hackers Eye Big Paydays and CIOs, CISOs Face the Real Risk of Ransomware

Hackers Eye Big Paydays and CIOs, CISOs Face the Real Risk of Ransomware

Ransomware is advancing on all fronts in the cyber crime space, with attacks on a daily basis ranging from spam and exploits. Nilesh Jain, at Trend Micro states that this isn’t just a regional problem, but a general global infection problem that will only grow. The country is still reeling under the recent hacks by a hacker group called Legion that claimed to have compromised databases...

Hewlett Packard Enterprise Report : Trials and Errors of Security Operations

Hewlett Packard Enterprise Report : Trials and Errors of Security Operations

Hewlett Packard Enterprise (HPE) today published its fourth annual State of Security Operations Report 2017, which provides deep analysis on the effectiveness of organizations’ security operations centers (SOCs), and best practices for mitigating risk in the evolving cybersecurity landscape. The report examines nearly 140 SOCs in more than 180 assessments around the globe. Each SOC is measured...

Promenade Software Launches Info Sharing and Analysis Organization MedISAO

Promenade Software Launches Info Sharing and Analysis Organization MedISAO

Promenade Software, Inc. announced the launch of MedISAO, an Information Sharing and Analysis Organization dedicated to improving the cybersecurity of Medical Devices through education, awareness and advocacy. MedISAO provides a community for medical device manufacturers and service providers, to collaborate and distribute information about cybersecurity threats and vulnerabilities that may...

Edward Snowden's Stay in Russia, Officials Confirm Asylum Extended Until 2020

Edward Snowden's Stay in Russia, Officials Confirm Asylum Extended Until 2020

Former National Security Agency (NSA) contractor Edward Snowden will be allowed to stay in Russia until 2020 and will now have the chance to apply for citizenship, according to officials within the nation's Foreign Ministry. The spy-turned-whistleblower, with the help of WikiLeaks, was granted asylum in Russia after the US government reportedly cancelled his passport as he attempted to reach...