Sicherheitsinfos

securitymagazine.comToday, technology is evolving at a faster rate than ever before. As a result of the rapid rate of change, we are creating an ever-increasing amount of data....

securitymagazine.comOn a recent trip to Australia, I appeared on a National morning news show. It wasn’t long until the hosts were trying to get me to weigh in on a debate that was then raging in their legislature....

securitymagazine.comMany of the positions I held in my corporate security career relied on my ability to accurately assess an individual or an event....

securitymagazine.comAs CSO, Steve Baker is reponsible for the strategic plans and operations of the Global Security and Investigatives function. How does he guide direction and ensure alignment with the business functions of a successful enterprise?...

securitymagazine.comThe Washoe County School District (WCSD) in Nevada announces a data breach, involving 114,000 students enrolled at WCSD between 2001 and 2016, and "a much smaller number of staff members employed during the same period", says a WCSD press release. ...

securitymagazine.comIn a recent study, respondents say that mobile technology enables them to optimize inventory planning and management (96 percent) and point-of-sale (96 percent), personalize the customer experience (96 percent), as well as boost employee productivity and motivation (95 percent)....

securitymagazine.comThe CST January-June 2019 Antisemitic Incidents Report shows a record high total of 892 antisemitic incidents in the UK in the first six months of 2019. ...

securitymagazine.comA new State of The Crowdsourced Security in 2019 study reports a 92 percent increase in total vulnerabilities reported over the previous year....

securitymagazine.comThe relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department....

securitymagazine.comWhat happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds....

securitymagazine.comA majority of organizations continue to struggle with insider threat detection and management – largely due to outdated systems, immature programs, and insufficient investments....

securitymagazine.comThe FAA in partnership with Kittyhawk relaunched its B4UFLY mobile application that allows recreational drone flyers know where they can and cannot fly in the national airspace system.  ...

threatpost.comIn addition, Google’s latest Chrome version implements 43 new security fixes....

threatpost.comA researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data....

threatpost.comThe RIG exploit kit and Safari redirects are both in the adversaries' bag of tricks....

threatpost.comThe complaint claims the networking giant knowingly sold bug-riddled software to federal and state governments, that would allow complete network compromise....

threatpost.comResearchers are warning that unpatched flaws found in the Hickory Smart Bluetooth Enabled Deadbolt allow an attacker with access to a victim's phone to break into their houses....

threatpost.comThe proxy is being distributed by the RIG and Fallout exploit kits....

threatpost.comApple's Siri follows Amazon Alexa and Google Home in facing backlash for its data retention policies....

threatpost.comVast majority of Apple iOS users haven't updated to iOS 12.4, leaving themselves wide open to a public exploit....

threatpost.comResearchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities....

threatpost.comComprehensive testing of 21 free Android antivirus apps revealed big security vulnerabilities and privacy concerns; especially for AEGISLAB, BullGuard, dfndr and VIPRE....