Cyber Security

NeuLion, Sky, Rogers Media Experts to Discuss DRM Content Protection Challenges Nov. 15

It’s among the more pressing questions today for media and entertainment companies today: when looking at content protection technologies and services, should I just build my own... More

Every Patch for the KRACK WiFi Vulnerability Available Right Now (ZDNet)

Monday morning was not a great time to be an IT admin, with the public release of a bug that effectively broke WPA2 wireless security. Security experts have said the bug is a tota... More

Five Cybersecurity Predictions for Tomorrow’s Internet (TechSpective)

Cybersecurity is quickly becoming part of everyone’s daily life and can no longer be separated between personal and work life. In the past, cyber-attacks were typically only a co... More

Calling All Millennials: Your Cybersecurity Industry Needs You (The Guardian)

Job prospects are booming in cybersecurity as the industry struggles to attract enough qualified staff. These shortages are undermining the security industry’s ability to protect... More

NSS Labs Conducts First Cross-Platform Test of Leading Web Browsers (CDSA)

NSS Labs today announced the release of its Web Browser Security Comparative Reports. The reports reveal how effective web browsers are at protecting users from socially engineered... More

Teradata, Dataguise Partnership to Power Enterprise Data Security, Compliance (CDSA)

Dataguise, a data-centric audit and protection (DCAP) firm, has announced that Teradata has furthered its alliance with Dataguise to deliver DgSecure software to its global enterpr... More

Ransomware is Big Business, and Malware Developers are Cashing In (ZDNet)

The total value of ransomware sales on dark web market places has rocketed from $250,000 to over $6m in just a year, as demand for the file-encrypting malware grows. Ransomware ... More

Think Twice Before Logging on to Public WiFi (Cybersecurity Law Forum)

What’s not to love about free, public Wi-Fi?  It’s free. It’s easy. A couple of clicks and you’re connected to the world. When you’re on the go, there will always be ... More

Cybersecurity Evolution Brings Shifts for Network Security (TechTarget)

Jon Oltsik, an analyst with Enterprise Strategy Group Inc. in Milford, Mass., said he sees a broader cybersecurity evolution driving changes affecting enterprise network security. ... More

Social Engineering and Smishing: What You Need to Know (Kroll Blog)

In 2016, the FBI reported that U.S. cyber crime losses exceeded $1.3 billion. Many of these cyber crimes could be directly traced to social engineering or phishing campaigns. S... More

Vulnerability and Patch Report, Oct. 15, 2017 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version Updates are available from Adobe’s website. Avira Antivirus: Avira has released versio... More

Hackers Are Using LinkedIn to Tailor Their Phishing Attacks Just for You (Hashed Out)

Hackers have begun using LinkedIn, the popular social network for business professionals, to create better phishing attacks. Already, one breach – at Vevo – has been attributed... More

The Five Tenets of Cybersecurity (SANS)

In the two day MGT433 Securing the Human course, we start the class by defining what risk is. Security awareness is nothing more than a control to manage human risk. To manage risk... More

Eight Tough Questions Every CISO Should Be Ready to Answer (BankInfoSecurity)

When a major security incident, such as the recent massive Equifax data breach, grabs headlines, CEOs start asking more questions about data security. CISOs need to be thinking ... More

How Overconfidence Can Lead to Lax Cybersecurity (CSO)

Do you have confidence that your in-house security personnel has the knowledge, experience and technology to defend against cyberattacks? If so, there’s a chance that you may be ... More

A Game-Changing Watermark for Live Sports (Irdeto Perspective)

Watermarking is an essential part of any anti-piracy program. More now than ever, as pirates have started to remove the broadcaster’s logo from the stream. But with a unique robu... More

Malware That Hijacks Your Computer to Mine Cryptocurrency Is Swarming Across the Internet (Futurism)

Last month, visitors of BitTorrent search engine/piracy website The Pirate Bay noticed their central processing unit (CPU) usage spike. However, the problem wasn’t related to the... More

Four Ways You Can Get Hacked Through Your Smartphone (Yahoo! Finance)

The relationship between smartphones and securing personal information can be complicated. On the one hand, banking and payment apps have made it easier than ever to stay on top o... More

Fear Not: You, Too, Are a Cybercrime Victim! (Krebs on Security)

Maybe you’ve been feeling left out because you weren’t among the lucky few hundred million or billion who had their personal information stolen in either the Equifax or Yahoo! ... More

Vulnerability and Patch Report, Oct. 8, 2017 (Citadel Information Group)

Important Security Updates Apple Multiple Products: Apple has released updates in macOS Sierra, watchOS, iOS, and others. Additional details are available on Apple’s website. ... More