By: - Dir. Solutions Marketing

SC Magazine 2014 Malware Defenses Survey Results

August 11th, 2014

The report on the 2014 Malware Defenses survey conducted by SC Magazine is now out. Overall, it shows that organizations are starting to wake up to the risk of targeted (or APT) attacks – but they still have a ways to go on many fronts. In this first of three posts, we will delve into […]



By: - Dir. Solutions Marketing

Infosec-Haiku

August 10th, 2014

Anata no joho sekyuritei konshu no haiku Using Tor to Hide? FBI Infecting You With Drive-by Malware!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours […]



By: - Director, Product Management

@russbernst

It’s Back-to-Patching This August Patch Tuesday

August 7th, 2014

It’s back to school time for students and with Patch Tuesday just around the corner, it’s back to patching for IT too. Nine bulletins were announced in Microsoft’s advanced notification system today, 2 critical and 7 important. First on our radar this month is an update for IE. In a blog post published by Microsoft […]



By: - Independent Computer Security Analyst

@gcluley

PayPal left red-faced after more security holes found in two factor authentication

August 6th, 2014

Just over a month ago, security researchers revealed that one of PayPal’s primary mechanisms to protect accounts from hackers had been fundamentally flawed for years. Researchers at Duo Security discovered a method of bypassing the two-factor authentication (2FA) technology used by the site, which is supposed to protect your account should your PayPal username and password […]



By: - Senior Architect

@danteal

Stealthy Malware is Never Invisible

August 5th, 2014

New malware identified as ‘Poweliks’ is currently in the news because of its stealthy nature.  The malware does not reside as a file on the disk, rather it is stored in the registry and uses some interesting tricks to execute at startup and remain hidden from system administrators.  The full description of the malware can […]



By: - Dir. Solutions Marketing

Is It the End of the (USB) World as We Know It?

August 4th, 2014

News this past week about a Proof-of-Concept tool called BadUSB which has the IT security press in a lather. Why? Well, we all know that USB sticks are used to spread malware. But this POC by SRLabs security researchers Karsten Nohl and Jakob Lell – which will be demonstrated at Black Hat USA 2014 – […]



By: - Dir. Solutions Marketing

Infosec Haiku

August 4th, 2014

Anata no joho sekyuritei konshu no haiku Jimmy John’s Gets Hit Payment Systems Breached via Remote Access Vulns   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if […]



By: - Independent Computer Security Analyst

@gcluley

Gambling website Paddy Power took four years to tell 650,000 customers their data had been stolen

August 1st, 2014

Yesterday, popular gambling website Paddy Power found itself admitting that it had suffered a serious data breach – the kind of position that no company ever wants to find itself in. Not that you would know if you visited their website, of course. Because there’s no mention of the issue on the front page that their […]



By: - Independent Computer Security Analyst

@gcluley

7 Out of Top 10 Internet of Things Devices Riddled With Vulnerabilities

July 31st, 2014

It has become the trendy thing to connect more and more household and office devices to the internet. It is becoming increasingly common to find yourself typing a WiFI password not just into your smartphone, but also your smoke alarm, your fridge, your printer, your baby monitor and maybe even your car. However, are the […]



By: - Dir. Solutions Marketing

Information Aversion – The Ostrich Effect

July 30th, 2014

Are we hurting our cause when we describe, in gruesome detail, the potential outcomes of a data breach or other IT security breach? Are we inadvertently pushing real security further off when we chase on the latest whiz bang technology instead of focusing on making steady progress? That’s what came to mind when I recently […]



By: - SVP Global Marketing

@cedwardbrice

2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

July 29th, 2014

Originally published on ITBusinessEdge. » Read the full article In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: what are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable […]



By: - Dir. Solutions Marketing

Infosec Haiku

July 28th, 2014

Anata no joho sekyuritei konshu no haiku More Data Breaches This Time: Goodwill Industries How Low Will They Go?   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … […]



By: - Dir. Solutions Marketing

Infosec Haiku

July 21st, 2014

Anata no joho sekyuritei konshu no haiku Energetic Bear Attacking ICS Space Havex is Havoc   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, […]



By: - Independent Computer Security Analyst

@gcluley

Google’s Project Zero – Targeting Zero-Day Vulnerabilities

July 16th, 2014

Google has announced that it is assembling a crack team of researchers, devoted to finding and reporting security holes in widely used software. According to Google security engineer Chris Evans, the group – which has been dubbed “Project Zero” – aims to uncover unpatched security vulnerabilities before they are exploited in targeted internet attacks. “Our […]



By: - Dir. Solutions Marketing

July Java Jamboree

July 15th, 2014

The latest Critical Patch Update (CPU) from Oracle has been released today. Based on the pre-release information, the July 2014 CPU contains 113 new security vulnerability fixes, covering everything from its flagship database and Fusion Middleware to Hyperion and Solaris. [See update below.] Of particular interest to endpoint administrators will be the 20 vulnerabilities in […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com