Menu

Security / News

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

Written by Tim Greene25 Feb. 17 05:03

Fraud rise as cybercriminals flock to online lenders

The latest quarterly ThreatMetrix Cybercrime Report shows 1 million cyberattacks targeted online lending transactions throughout 2016, causing estimated losses of more than $10 billion.

Written by Thor Olavsrud25 Feb. 17 01:28

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

Written by Lucian Constantin24 Feb. 17 09:35

Eleven-year-old root flaw found and patched in the Linux kernel

Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

Written by Lucian Constantin24 Feb. 17 02:11

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.

Written by Michael Kan24 Feb. 17 00:30

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

Written by Lucian Constantin23 Feb. 17 05:58

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on.

Written by Tim Greene23 Feb. 17 04:54

How DOT CIO discovered a network compromised by shadow IT

Finding of hundreds of pieces of unauthorized networking equipment, including many off-the-shelf consumer-grade devices, compelled the Department of Transportation CIO to alert department leadership and launch a rearchitecture of the network.

Written by Kenneth Corbin23 Feb. 17 01:31

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better ,but we've together this list of clues to help you avoid a costly error.

Written by Sharon Florentine22 Feb. 17 21:33

Hackers behind bank attack campaign use Russian as decoy

The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

Written by Lucian Constantin21 Feb. 17 02:00
  • 6 Styles of Customer Analytics

    Different types of analysis suit different customer strategies.

    Gartner

    Gartner, Inc. is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right decisions, every day.

  • Market Place

    Computerworld
    ARN
    Techworld
    CMO