Corporate Partners

Top IT Security Bloggers

  • Will Bitcoin Succeed?

    TrendLabs - Malware Blog
    When you work for a security company, sometimes people think you must know everything there is to know about technology. So sometimes I get asked, “Will Bitcoin and other cryptocurrencies succeed?” Unfortunately, I’m an engineer, not an economist. I can’t speak to how big central banks like the Federal Reserve in America, the Bundesbank here […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroWill Bitcoin Succeed?
  • How to send 5 million spam emails without even noticing

    Sophos - Naked Security
    Before you read the article, see if you can guess, to the nearest million, how many spams a 10,000-strong botnet might realistically send each week.

    Commit yourself first, and then read the story of the SophosLabs "honeybot"!
  • Oxford and Cambridge in the race to eliminate passwords

    Sophos - Naked Security
    Cambridge University are working on a technology-oriented approach where multiple small devices create an "electronic aura", enabling a main device to transmit a unique identification signal. Meanwhile a company spun out of an Oxford University programme is developing more biomechanical methods of recognising people based on the way they move, behave and interact with devices.
  • Apple faces class action suit for tracking users without consent

    Sophos - Naked Security
    A Californian plaintiff says that nobody at Apple ever told her about tracking her whereabouts, nor did anybody ever ask for her permission. She says she only found out about it by watching a recent Chinese state TV report about iPhone being a security risk to the state.
  • Why I WOULD Eat at P.F. Chang’s After their Data Breach

    Trend Micro - Cloud Security Blog
    Recently FBI director James Comey told ABC News that there are two kinds of companies: those that have been hacked and know it, and those that have been hacked and don’t know it. One company, P.F. Chang’s, recently fell into the hacked category, and from our view, their handling is a text-book case in the...
  • Evernote Patches Vulnerability in Android App

    TrendLabs - Malware Blog
    We have previously discussed an Android vulnerability that may lead to user data being captured or  used to launch attacks. We discovered that the popular Android app for Evernote contained the said vulnerability. We disclosed the details to Evernote, and they took action by issuing an update to the Android version of their app. Evernote has added additional […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroEvernote Patches Vulnerability in Android App
  • Evernote Patches Vulnerability in Android App

    Trend Micro - Security Intelligence
    We have previously discussed an Android vulnerability that may lead to user data being captured or  used to launch attacks. We discovered that the popular Android app for Evernote contained the said vulnerability. We disclosed the details to Evernote, and they took action by issuing an update to the Android version of their app. Evernote has added additional […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroEvernote Patches Vulnerability in Android App
  • What You Need to Know about the P.F. Chang’s Data Breach

    Trend Micro - Cloud Security Blog
    In June 2014, P.F. Chang’s restaurants confirmed they had been contacted by the United States Secret Service regarding a possible data breach affecting customer credit and debit cards. On August 4, 2014, they announced they had completed their investigation and confirmed that their credit card processing system had been compromised and that data from some...
  • Cloud Security Priorities and Synergies with Enterprise Security

    Network World - Networking Nuggets and Security Snippets
    According to ESG research, 63% of mid-market (i.e. 250 to 999 employees) and enterprise (i.e. more than 1,000 employees) are currently using Software-as-a Service (SaaS), 33% use Infrastructure-as-a-Service (IaaS), and 27% employ Platform-as-a-Service (PaaS) today (note: I am an ESG employee).  Additionally, 72% of all firms are increasing their spending on cloud computing initiatives this year.Wasn’t IT risk supposed to put the brakes on cloud computing deployment?  Security professionals are still quite concerned.  In a recent ESG research survey, infosec pros identified numerous cloud security risk areas as follows:
    33% of enterprise security professionals said: “a lack control over security operations directly related to IT resources used for internal purposes.”
    31% of enterprise security professionals said: “privacy concerns over sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”
    29% of enterprise security professionals said: “lack of security visibility into cloud services infrastructure.”
    28% of enterprise security professionals said: “a security breach that compromises our cloud service providers’ infrastructure.”
    27% of enterprise security professionals said: “poor infosec practices at our cloud service provider(s).”

    These are clearly legitimate concerns (the kind that keep CISOs up at night!), yet it seems like the proverbial horse has left the barn on cloud computing.  Enterprise organizations may be proceeding with caution, but they are proceeding nonetheless. To read this article in full or to leave a comment, please click here
  • Mozilla database leaks 76,000 email addresses, 4,000 passwords

    Sophos - Naked Security
    Email addresses and encrypted passwords of thousands of Mozilla developers were accidentally exposed for a month - and there are no guarantees that they were not snaffled up by those with ill intent.

Market Place