Quantcast
Channel: security news – Cyber Parse – Cyber Security and Information Security
Browsing all 4495 articles
Browse latest View live

SafeBreach Simulates Attacks on Customers to Find Security Risks

Attackers use multiples types of tools and techniques to exploit an organization that SafeBreach automates in an effort to determine risk. One way to know if a company is vulnerable to attacks is to...

View Article


Why Your Enterprise Must Pay Close Attention to IoT Device Security

NEWS ANALYSIS: It's apparent now that Internet of Things security is laughably bad, but you can prevent your enterprise from being the butt of the joke. The woman on the videoconference screen looked...

View Article


Internet of Things Security Problem Just Keeps Gettin Bigger

Recent reports about Webcams being readily accessible to anyone using an Internet port-scanning service shows why there has been little progress in securing connected devices as we move into 2016 Every...

View Article

ScriptRock Rebrands as UpGuard With More Focus on Security

The visibility vendor doubles down on security with a new scoring system to help organizations and insurance companies evaluate and remediate risk. When it comes to understanding the security risks an...

View Article

Google’s Chrome Browser May Soon Mark HTTP Sites Unsafe

Google reportedly plans to introduce a feature in its Chrome browser that warns users when they land on a HTTP site. Google is reportedly getting ready to implement a proposal it made slightly more...

View Article


DDoS Targets, Motivations Evolve as Attack Volumes Hit New Peaks

Criminals and rogue gamers have become the main sources of distributed denial-of-service attacks, as the peak attack size reaches 500G bps. Distributed denial-of-service attacks used to be reserved as...

View Article

NSA Gives Advice on Defending Against Nation-State Attackers

The head of NSA's offensive operations division explained how it uses vulnerabilities and how organizations can defend themselves. Among the cache of documents leaked by U.S. National Security Agency...

View Article

Spotting Insecure Websites Requires More Than Google’s Red X

NEWS ANALYSIS: Google’s plan to flag Websites as insecure depending on if it supports the HTTPS protocol is well intentioned. But it misses the mark in terms of flagging what’s secure and what’s not....

View Article


Azzurri maintains government-level security credentials with renewal of Cyber...

London, 2nd February 2016: Managed communications services provider Azzurri Communications today announced that it has achieved the Government’s Cyber Essentials Plus accreditation for a second year....

View Article


AppSense Announces Record Results for Q2 and First Half of Fiscal 2016

Company Marks Best Quarter in History as Demand for Endpoint Security Solutions SoarsREADING, UK., February 2, 2016 – AppSense, the global leader of secure user environment management (UEM), today...

View Article

Fisher-Price Smart Teddy Bear Latest IoT Toy Under Hacker Scrutiny

The latest device with a security vulnerability is Fisher-Price's Smart Toy, as flaws in the connected Internet of things world continue to mount. When it comes to the emerging Internet of things...

View Article

U.S., EU Agree on Privacy Shield to Maintain Transatlantic Data Flow

Salesforce.com is introducing new and updated products based on its Lightning interface technology that are designed to enable businesses to run their sales operations on mobile devices. The free flow...

View Article

Rigby Private Equity Opens Up New Office In Austria

Wick Hill and Zycko strengthen Austrian business with new office in ViennaLondon, Cirencester and Woking, UK: Rigby Private Equity (RPE) announces the opening of a new office in Vienna, Austria....

View Article


Logicalis and HPE Introduce ‘IT Custodian’: Best Practice Service Management...

Logicalis SMC and HPE combine to accelerate digital transformation via a complete, rapidly deployable big data ITSM solutionLondon, UK, 03 February 2016 – Logicalis, the international IT solutions and...

View Article

Google to deep six dodgy download buttons

Google has taken aim at another class of internet scumware: the deceptive download buttons that infest advertising on places like free software directories. “Your computer is out of date!” ads and the...

View Article


Microsoft’s malware mitigator refreshed, but even Redmond says it’s no longer...

Microsoft's enhanced mitigation toolkit (EMET) has been updated with support for Windows 10, but the company says you don't really need to download it any more. The defence tool is Microsoft's way of...

View Article

Go phish your own staff: Dev builds open-source fool-testing tool

Security-oriented programmer Jordan Wright has published a capable and slick open source framework to help businesses defend against phishing attacks. The anti-phishing tool runs on 64-and-32-bit...

View Article


Winning Underhand C Contest code silently tricks nuke inspectors

The winner of an annual competition to write the best innocent-looking but actually malicious C code has been announced – and it terrifyingly involves hoodwinking nuclear weapons inspectors. On...

View Article

Row over GCHQ-built voice algo MIKEY SAKKE rumbles on

GCHQ has defended its controversial MIKEY-SAKKE phone encryption protocol against criticism that it leaves a backdoor into systems that support the technology. The CESG assurance arm of the UK...

View Article

ISPCC Childline and Vodafone Ireland Foundation Announce Major New Partnership

Working to Keep Children Safe by Keeping Them Connected4th February 2016 ISPCC Childline and the Vodafone Ireland Foundation are delighted to announce a major five year partnership that aims to keep...

View Article
Browsing all 4495 articles
Browse latest View live