Rogue WiFi Access Points: Would You Know the Difference?

Rogue WiFi Access Points: Would You Know the Difference?

/ / security
When traveling, at trade shows or when visiting a client or customer, a wireless access point (AP) can offer the most convenient way to connect to the web. And the most dangerous, too: beware the "rogue" access point ... Read More
Hoodwinked: Why Our Eyes Won't Protect Us Against Phishing and Fake Websites

Hoodwinked: Why Our Eyes Won’t Protect Us Against Phishing and Fake Websites

Our eyes were the gatekeepers between fact and fiction - then the internet came along. The visual information we encounter and interact with on the web is digitally created and manipulated - and we’re not ready for it ... Read More
The Silo Sessions #05: Browser Talk with RSA Visitors and Exhibitors

Browser Security: Pwned and Exposed

Supposedly secure browsers are making headlines, but not in a good way. Their makers cannot gloss over the security weaknesses any longer. * Browser makers should be concerned, very concerned. Last week, a security researcher with software firm AdGuard called out five malicious ad blocking extensions in the Google Chrome ... Read More
SSL Certificates Boost Security? Many Don’t.

SSL Certificates Boost Security? Many Don’t.

/ / SBN News, security
Massive disruption is coming to websites that use digital certificates issued by Symantec or the brands that it has owned. Effective this week, two major browsers will not accept any SSL certificates issued by Symantec that were issued before June 2016 ... Read More
HTTPS: Beware the False Sense of Security

HTTPS: Beware the False Sense of Security

/ / Privacy, security
HTTPS is the protocol that is getting a lot of attention these days. As more browsers migrate toward supporting it in meaningful ways — like by not connecting to sites that do not offer it — it would be easy for a user to think that once HTTPS has been ... Read More
The Six Biggest Inside Threats to Law Firm IT

The Six Biggest Inside Threats to Law Firm IT

by Jordan McQuown, CIO, LogicForce Incidental actions of insiders pose a threat to law firm IT that is often underestimated. What are the six biggest internal cybersecurity risks for your law firm, and how can you counter them? ... Read More
GDPR: A Deadline You Can’t Afford to Ignore

GDPR: A Deadline You Can’t Afford to Ignore

On May 25th, the EU’s General Data Protection Regulations (GDPR) goes into effect - and it will affect your business with Europeans no matter if your company has an actual presence in Europe or not ... Read More
Local Browser Wins Olympic Gold for Worst Security

Local Browser Wins Olympic Gold for Worst Security

by Amir Khashayar Mohammadi Nearly every web browser comes equipped with a built-in password manager. Combined with all its other inherent vulnerabilities, this makes the local browser an even more attractive target for automated attacks. The bad guys would love to gain access to the container that keeps track of ... Read More
10 IT Weak Spots Hit Hardest by the Cybersecurity Talent Shortage

10 IT Weak Spots Hit Hardest by the Cybersecurity Talent Shortage

by Larry Loeb About 350,000 IT positions that require cybersecurity knowledge and skills remain currently unfilled. What impact does the acute talent shortage have on critical day-to-day IT security tasks? * According to Bloomberg BNA, 2017 was the Year of the Data Breach. Major institutions and organizations suffered from damaging ... Read More
Adobe Flash: Updating the Problem is Not a Solution

Adobe Flash: Updating the Problem is Not a Solution

by Amir Khashayar Mohammadi Right in time for Groundhog Day, another serious Zero-Day vulnerability has been added to the long list of Adobe Flash Player exploits. Early reports indicate that North Korean nation-state actors have taken advantage of this security flaw at least since mid-November 2017. If you still run ... Read More
Loading...