Advertisements


US Pressing for Quick Activation of THAAD in South Korea

The THAAD anti-missile system could be up and running in South Korea within days despite local protests, the uncertain outcome of South Korea’s presidential election,... The THAAD anti-missile system could be up and running in South Korea w.....»»

Source:  DefensetechCategory: Security2 hr. 58 min. ago Related News

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. military, which continues its interest in bug bounty programs as a way to improve cybersecurity, is launching a new contest next month.Called “Hack the Air Force,” the new program will put certain of the branch’s Web sites up as tar.....»»

Source:  NetworkworldCategory: Security22 hr. 41 min. ago Related News

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 I.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs.To.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 I.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Foiled! 15 tricks to hold off the hackers

Malicious hackers have outsize reputations. They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single keystroke—or so Hollywood says. Those of us.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of at.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of at.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

IBM: Financial services industry bombarded by malware, security threats

The financial services industry is the target of a whopping 65% more targeted cyber-attacks than the average business, according to security watchers at IBM’s X Force.The number of financial services records breached skyrocketed 937% in 2016 to.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Enterprise security technology consolidation

Look around the cybersecurity infrastructure at any enterprise organization, and here’s what you’ll see—dozens and dozens of cybersecurity tools from just as many vendors. Now this situation wasn’t planned; it just happened. Over the past.....»»

Source:  NetworkworldCategory: SecurityApr 27th, 2017Related News

Hawaii May Get Missile Interceptor Site to Defend Against North Korea

As North Korean dictator Kim Jong Un issues specific threats against the U.S. and other nations, the state of Hawaii may need to shore up... As North Korean dictator Kim Jong Un issues specific threats against the U.S. and other nations, the stat.....»»

Source:  DefensetechCategory: SecurityApr 27th, 2017Related News

How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing scam and how you an.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

Drunken man arrested for assaulting 300-lb. K5 security robot

So, you toss back a few drinks and decide now is the best time to “test” a 5-foot tall, 300-pound, egg-shaped security robot that is patrolling a Mountain View, California, parking lot. Although it might seem like a good idea when you are drun.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

IDG Contributor Network: Cyber crime as a service forces changes in information security

Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge. Just use Google to learn how to access the Dark Web, and y.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

Report: Top 25 IT security products

Nothing beats hearing from your peers about which IT security products have been successful in the enterprise. IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by differ.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News

IDG Contributor Network: MasterCard puts a finger on fraud

Most credit card verification systems only verify whether the card is valid and not if the presenter is the authorized cardholder. MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new Master.....»»

Source:  NetworkworldCategory: SecurityApr 26th, 2017Related News