Quantcast
Channel: security news – Cyber Parse – Cyber Security and Information Security
Browsing all 4495 articles
Browse latest View live

Cisco Mid-Year Security Report: Bad Guys Getting Badder

Enterprises making security improvements, but without integrated threat defenses, the hackers are still two jumps ahead. While the enterprise and personal data security vendor communities are making...

View Article


Kremlin-backed hackers used Twitter to breach US government systems

FireEye claims Russian hackers are using Twitter to steal data in almost 'undetectable' attacks

View Article


IONU Launches Data-Centric Security Platform

The company’s data-centric platform protects sensitive data residing on or traveling to and from mobile devices within and outside of the firewall. IONU announced the launch of its data-centric...

View Article

Facebook Intros New Tool for Keeping Its Users Secure

Adding to its security arsenal, Facebook launched Security Checkup, which provides account login status, login alerts and password safety features. Facebook, continuing its efforts to help keep users...

View Article

Researchers Use Malware to Transmit Data Between Air-Gapped Computers

By infecting a computer and a phone, researchers were able to transmit data between the two systems without any sort of network connection. Disconnecting a computer from all networks is no longer a...

View Article


Vendors Finding Value in Bug Bounty Programs

A Bugcrowd report that examines 30 months of bug bounty submissions across 166 programs finds crowdsourced bug discovery is gaining adoption across the industry. Casey Ellis started Bugcrowd in 2012...

View Article

BT Signs Contract With Ark Data Centres

Corsham, Wiltshire - 31 July 2015 - BT has selected Ark Data Centres Limited as a new UK data centre supplier and is adding Ark’s sites in the south of England to its BT Compute portfolio to meet the...

View Article

oneM2M Advances Worldwide Interoperability Agenda through Plans for...

Sophia Antipolis, France, 31 July 2015. At their 18th Technical Plenary meeting held in Philadelphia, PA, on 20-24 July, oneM2M's members agreed on plans for the second release of oneM2M specifications...

View Article


Seven Highly Anticipated Talks at Black Hat, DefCon Events

The Black Hat USA 2015 and DefCon 23 security conferences in Las Vegas from Aug. 4 to Aug. 9 will tackle an unmatched range of topics and some excitement—and concern—over the technologies shown to be...

View Article


Hacking Team Leak Could Lead to Policies Curtailing Security Research

While the disclosure of Hacking Team's marketing of zero-day flaws has roiled the security community, the reaction of policy makers could have a lasting impact on legitimate security research. The...

View Article

Satellite Hacking Can Wreak Havoc, Black Hat Talk to Demonstrate

A researcher is set to detail how satellite tracking can be hacked, enabling misdirection of assets and theft. Satellite tracking systems are used for myriad activities, including monitoring the...

View Article

Wandera partners with Three to provide mobile data security and optimization

New partnership extends Wandera’s Secure Mobile Gateway to Three’s business customers in IrelandLondon and Ireland, 3rd August 2015 – Wandera, provider of advanced mobile threat prevention and data...

View Article

RIG 3.0 Exploit Kit Infects Millions, Most Notably Adobe Flash Users

Trustwave researchers infiltrate the exploit kit's infrastructure and find a high success rate for Flash exploits. The RIG exploit kit is undergoing an evolution to version 3.0 as malware authors seek...

View Article


IBM, RIT Team on Cyber-Security Training

IBM extended its ongoing relationship with the Rochester Institute of Technology by partnering on a program to advance cyber-security education. IBM and the Rochester Institute of Technology (RIT)...

View Article

UL Labs Examining Wearables Security Concerns

With the rising use of wearable devices, Underwriters Laboratories is working to establish a cyber-security framework to help protect the devices. As more personal digital wearable devices are bought...

View Article


Q&A With Black Hat, DEF CON Founder Jeff Moss

In-demand consultant and former hacker offers his takes on trends, privacy, machine learning -- and why you should always keep your keys in your pocket. The Black Hat professional security conference...

View Article

Researchers demonstrate firmware attack targeting Macs

Security researchers to demonstrate undetectable 'Thunderstrike 2' attack against Apple firmware

View Article


BGP Security Is in Black Hat’s Cross Hairs

Border Gateway Protocol risks are being explored at the Black Hat USA security conference, with new tools set to debut to improve security and detection of BGP security events. The Border Gateway...

View Article

Bug Bounty Programs Paying Off for Vendors, Security Researchers

Organizations have a number of methods at their disposal that they can use in their effort to improve security, one of them being to institute a bug bounty program. Bug bounty programs incentivize...

View Article

Chinese VPN Provider Using Malware to Expand Network

A purveyor of virtual private networks sold under multiple brand names uses malicious code to infect servers and turn them into nodes in its infrastructure, according to RSA. A Chinese virtual private...

View Article
Browsing all 4495 articles
Browse latest View live