- German researchers hack Galaxy S5 fingerprint login
- JP Morgan to invest £150 million on boosting cyber security
- Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
- Today's Approach to Security is Broken
- Symantec draws new security picture
hackers in pictures
While security vendors weigh their product ranges for vulnerability to the recently discovered 'Heartbleed' bug, Symantec's massive digital certificate infrastructure remains secure – but the company is advising customers to update the vulnerable OpenSSL code and then regenerate their public key infrastructure (PKI) private keys, according to its Melbourne-based senior principal systems engineer Nick Savvides.
While security pros hustle to patch Web sites affected by the widespread OpenSSL flaw nicknamed Heartbleed, there are indications that cybercriminals are hoping to beat them to the punch.
Consumers may well have lost sensitive data without even knowing it.
The words of warning about Windows XP's impending end-of-life are no joke. After April 8, Microsoft will stop supplying security patches for the 13-year-old operating system--and a recent blog post by Avast, provider of one of the more popular free antivirus solutions around, drives home just how dangerous using Windows XP beyond that is.
Nearly three years after now-defunct Dutch digital certificate authority Diginotar was compromised, would-be hackers are still trying to use its digital certificates to sneak malware onto outdated and insecure systems, according to a Symantec security expert.
Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.