Thursday, December 5, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News

News

US Ports – Cyber attacks can cause the release of dangerous chemicals

US Ports are still vulnerable to cyber attacks that release dangerous chemicals, cybersecurity in the maritime industry is crucial for Homeland security. Critical infrastructure across the world are vulnerable to cyber attacks, this is not novelty, but it is interesting to...

10 Common File Transfer Risks and How to Avoid Them

Have you ever caught yourself saying one of the following? “We don’t have an IT department, so I FTP from my desktop.” “I don’t need special software to transfer files; I have email.” “We’re a small/mid-sized organization. We don’t...

Some versions of Netgear routers remain vulnerable to arbitrary command injection

A security flaw was discovered in some NetGear routers that could be easily exploited by a remote attacker to gain root access on the device and remotely run code. Some versions of Netgear routers remain affected by a security flaw that could...

Stuxnet infected the network of Russian nuclear facility

10:30 ET, 11 November 2013 Eugene Kaspersky revealed that a staffer at the unnamed nuclear Russian plant informed him of the infection of internal network with Stuxnet. We have a lot of information on Stuxnet virus, a powerful malware that for...

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure...

Malware spam campaign exploits WinRAR flaw to deliver Backdoor

Experts discovered a malspam campaign that is distributing a malicious RAR archive that could exploit the WinRAR flaw to install deliver malware on a computer. A few days ago, security experts at CheckPoint software have disclosed a critical 19-year-old vulnerability...

How to Reduce Your Company’s Susceptibility to Hacking

Thinking before the attack, not about the aftermath By Zack Schuler, founder, and CEO of NINJIO When most people think about cybercrime, they think about headlines: data breaches that affect hundreds of millions of customers, crippling financial losses for companies, and...

The Risks (and Prevention) of Crime-as-a-Service in Healthcare

By Kurt Long, Founder, and CEO, FairWarning The recent study from the Brookings Institution detailing that 25 percent of hacking attempts will focus on healthcare data should serve as a critical notification for industry providers. Since 2009 the study found...

HPE allowed Russians to review the code of ArcSight software, which is also used...

HPE gave Russian gov access to review ArcSight software that is currently used by corporate and government entities worldwide, including the Pentagon. The recent news of the alleged hack of Kaspersky products to steal NSA exploit from the personal PC of...

Root Cause Analysis: Phishing Attacks…Solution? Read on…

Stopping the #1 Source of Exploitation:  Spear Phishing in Depth Again, Inky® receives another award, two years in a row.  You're still wondering who they are and why they are so important?  First, let's review their name, who their founder...

STAY CONNECTED

36,002FansLike
56,039FollowersFollow
Show Buttons
Hide Buttons