Top IT Security Bloggers

  • UK government plans to spy on email, web and internet phone use

    Sophos - Naked Security
    There may be some criminals who are caught through proposed government electronic spying powers - but at what cost to freedom and privacy?
  • Gumming up the internet: When DNS servers attack..

    Sophos - Naked Security
    Operation Blackout's plan to shut down the internet this weekend may have come to nothing, but there is a way in which DNS servers can be used as part of a malicious attack.

    Professor Alan Woodward explains more.
  • Anti-virus - is the glass half-empty, or half-full?

    Sophos - Naked Security
    Security professionals, analysts, journalists and people in the pub: there's a vocal minority in all those groups which likes to be heard to say, "Anti-virus isn't good enough for today's threats".

    But is it true? Paul Ducklin has his say.
  • MasterCard and Visa payment processor compromised, up to 10 million cards stolen

    Sophos - Naked Security
    Over 10 million credit cards may have been stolen by criminals who compromised a credit card processing company last month. Read on to find out what happened and what actions you may wish to take to protect yourself.
  • Inside an APT: LuckyCat Redux

    Trend Micro - Cloud Security Blog
    We recently wrote a post on Cloud Security and APT Defense in which we discuss the nature of an Advanced Persistent Threat as well as a few tips on how to stay safe. Now we have a real-world example to learn from. Our researchers have put together some comprehensive analysis for LuckyCat Redux which includes a study and [...]
  • Check your Twitter account for rogue applications

    Sophos - Naked Security
    If you're careless about what applications you allow to access your Twitter account, don't be surprised if you find the bad guys are spamming tweets out in your name without your permission.
  • Not waving but drowning

    Clearswift Blog

    Last week, experts told the US Senate it was time to assume that American military networks have been breached and that ramping up traditional fortress features like firewalls, AV and gateway devices was effectively a waste of time. Dr. Kaigham Gabriel, head of the Defence Advanced Research Projects Agency, compared current information and network protection efforts to treading water in the open ocean; all that blocking and locking did was slightly delay the inevitable.

    This reality check dovetailed rather nicely with the release of Verizon’s annual Data Breach Report for 2012, which found that hacking was linked to almost all of the 855 incidents and 174 million compromised records the company investigated in 2011. Malware featured in 95 per cent of all stolen data incidents.

    Hacking and malware have been exchanging places in the top three causes of data breach for years now. While there are plenty of tools out there doing a fine job of removing known threats using established methodologies, it’s becoming abundantly clear that this, on its own, is not enough to protect valuable information assets from falling into the wrong hands.

    The reality is that focusing on inbound threats is outdated. As Dr. James Peery, head of Information Systems Analysis Centre at the Sandia National Laboratories in the US puts it, “We’ve got the wrong mental model here.” It’s time to focus on the content, not the threat; controlling access is all well and good, but protecting information is paramount.

    If there’s one thing that the Data Breach Report underlines, it’s the reality that data theft and leakage come in a variety of flavours and vectors. Traditional, threat-focused methods are the equivalent of shooting in the dark. In today’s environment, it makes far more sense to protect your content and monitor it in the context of how you need to do business.

    Knowing where and how your information is used and understanding the context within which users communicate empowers you to extract maximum value without putting information at risk.

    Letting AV and threat-detection policies define your information protection stance is not only outdated, as 2011’s data leakage statistics suggest, it cannot protect your data. It’s time to stop treading water and start swimming.

    Nick Peart


    | Leave a comment  »

  • Mac backdoor Trojan embedded inside boobytrapped Word documents

    Sophos - Naked Security
    A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a boobytrapped Word document.
  • US House declines to block employers demanding Facebook passwords

    Sophos - Naked Security
    The US House of Representatives on Wednesday voted down a bid to stop telecommunications companies from demanding Facebook logins from prospective job applicants. Is this about privacy or a bun fight between parties?
  • Luckycat Redux: Inside an APT Campaign

    TrendLabs - Malware Blog
    Today, we published our paper titled Luckycat Redux, which looked into the activities of the Luckycat campaign. First documented earlier this month by our friends at Symantec, our investigation has significantly improved the available knowledge about not just this attack specifically, but about how targeted attacks unfold. Here are some of our findings: To understand [...]

    Post from: TrendLabs | Malware Blog - by Trend Micro

    Luckycat Redux: Inside an APT Campaign

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Webroot Web Security

Proactive web security that blocks threats in the cloud before they reach users’ machines, or enter customers’ networks.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).

  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.