The Justice Department announces that four alleged members of an international hacking ring have been charged with stealing intellectual property valued at $100 million, including a U.S. Army Apache helicopter simulator and Microsoft Xbox prototypes.
Undoubtedly, your network is more complex than ever. Your employees are accessing applications, using personal or work devices, but corporate risk and security factors are often ignored. Your business is a target. Are you prepared in the best possible way? The complexity of your network and infrastructure security may...
Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated...
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been...
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. To stop the escalation of cyber attacks, enterprises need a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
This...
More than 1.5 million DDoS attacks daily are targeting the Bash bug flaws known as Shellshock. Researchers have now discovered a total of four Shellshock vulnerabilities and warn that more may follow.
Federal regulatory agencies have several activities and resources in the works as the healthcare sector enters year two of a post-HIPAA Omnibus Rule enforcement environment. Find out what's planned.
The FDA is ramping up efforts to strengthen the security of medical devices. That includes a collaborative effort to develop a risk assessment framework to identify cybersecurity vulnerabilities and mitigate the risks.
The volume of new malware that is specifically targeting mobile devices is growing at an almost exponential rate. The nature of many of the new malware attacks is also becoming increasingly sophisticated - as cybercriminals recognize the value of the information that they can steal from mobile devices. Even though the...
When asked to describe the current cyber threat landscape, one of the more balanced and objective answers might be that threats are "hiding in plain sight." Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or
use common network...
Financial institutions are starting to report fraud tied to the massive Home Depot payment card data breach. One card issuer calls the fraud ramp up "much greater than what we saw from Target, Michaels and Neiman Marcus."
FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
What's as disturbing as news of the Chinese hacking U.S. defense contractors' systems is that the contractors failed to notify the military of most of those intrusions because of how they interpreted cyber-intrusion reporting requirements.
In the year since federal regulators began enforcing the HIPAA Omnibus Rule, there's been a huge spike in the number of major breaches reported. What's behind the surge?
Banking Trojans are increasingly being repurposed for espionage purposes. Recent victims of modified banking malware include a chemical manufacturer as well as an unknown number of Salesforce users.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.