Sadly, users are still their own worst enemy as they are not taking the safeguards to help protect themselves in digital mobile market today. As reported by Infosecurity Magazine, today, only 45% report locking their phone with a pin, password or biometric. Yet 83% of consumers are extremely, very or somewhat...
The internet of things is being compromised by malware-wielding attackers exploiting default credentials baked into devices. What will it take for manufacturers to ship devices that are secure by default?
Bad news: A developer has released the source code for Mirai malware, which is designed to automatically find and hack internet of things devices, turning them into DDoS cannons. The malware has been tied to recent record-smashing DDoS attacks.
Vulnerable internet-connected devices have been unwittingly drafted into electronic battle for DDoS attacks that have escalated to a new intensity in recent weeks.
A new cyberattack trend report from Europol notes that while online criminals continue to refine their capabilities, old and unsophisticated attacks too often still succeed, thanks to poor digital hygiene and a lack of security by design and user awareness.
The cybercrime sector involves a rapidly growing services economy that provides everything from bulletproof hosting and stresser/booter DDoS on demand, to ransomware-as-a-service and sites that offer to launder bitcoins via a process known as tumbling.
Two men have been arrested by Israeli police, at the request of the FBI, in connection with an investigation into the vDos site, which provided distributed denial-of-service - a.k.a. stresser or booter - attacks on demand.
An increasing number of sophisticated, high-performance security and content-aware devices are at layers 4
through 7. This calls for, among other things, even greater sophistication of network emulation from test equipment. When Layer 4-7 devices are not properly tested, they face a greater risk for failure within...
You've gone back and forth on encryption, its benefits and challenges, and you've made the decision: to keep your data truly safe, your organization needs encryption. So what now? You've got options available, but what is the best, safest way to implement encryption without disrupting your users' workflow and...
Effective incident response is growing tougher by the day. Threat actors use a cornucopia of methods to break into systems and often employ one attack such as DDoS that distract security analysts from wholesale looting of personal data. Meanwhile, security strategies are hampered by multiple tools and processes that...
How do companies in the healthcare industry better manage risk and keep their most valuable data safe when stolen healthcare information commands such a high price on the dark web? Download the case study, "Proactively Challenge Cyber Threats in the Healthcare Industry," to learn how this healthcare organization...
Understanding your adversaries' tools, techniques, and processes (TTPs) that they're likely to weaponize is the best way to anticipate and combat threats. This whitepaper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and...
Building a threat intelligence team from the ground up can be riddled with political inertia. This whitepaper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats.
Discover the six core competencies that comprise a...
A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy standards more stringently.
For years, organizations have been threatened by DDoS attacks on several fronts, ranging from
volumetric attacks to application-level and DNS strikes. Now come ransom-based attacks.
In this interview with Trey Guinn - head of solution engineering at CloudFlare - he discusses the importance of matching your DDoS...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.