By:

Survey Shows Disconnects in Mindshare, Budget, Time

August 3rd, 2015

Black Hat USA 2015 is underway in Las Vegas. The Black Hat conferences are an opportunity for IT Security professionals to learn new techniques and vulnerabilities from each other. They also provide ethical hackers a platform from which they can demonstrate the seriousness of the security flaws they find most important. This year no less […]



By: - Dir. Solutions Marketing

Infosec Haiku

July 31st, 2015

Anata no joho sekyuritei konshu no haiku Buy your Sysadmin a piece of pie today, or your PC goes down!   ### Notes ### * Thanks to Kurt N for jogging my memory — happy b-day!  And Matt — your pie will be delivered! * Thanks to Ms. Etsuko vdH for the translation. * Thanks […]



By: - Dir. Solutions Marketing

Windows 10 is Here! Windows 10 is Here!

July 29th, 2015

Unless you’re still buried under snow in Buffalo, you probably know that Microsoft released its newest operating system today. Windows 10 is the latest and greatest from Redmond, and as one pundit put it: Vista was awful, Windows 7 was okay, and the less said of Windows 8 the better, but Windows 10 looks to […]



By: - Independent Computer Security Analyst

@gcluley

Gaping hole in Android lets hackers break in with just your phone number!

July 27th, 2015

A researcher has found a serious Android vulnerability that requires no interaction at all by the user to hijack their device. In fact, the vulnerability could allow a hacker to infect your mobile phone, while you’re fast asleep.



By:

Ransomware – Now for Websites

July 27th, 2015

Over the last several weeks I’ve written about ransomware primarily as it relates to individual machines or mobile devices. There is another very sneaky variant of ransomware which you should be aware of. It’s specifically crafted to hold websites hostage. It’s called RansomWeb. It’s methodology is slow and diabolical, and I believe it’s out there […]



By: - Dir. Solutions Marketing

Infosec Haiku

July 25th, 2015

Anata no joho sekyuritei konshu no haiku Delete Old Data Reduce Scope of Protection Save Embarrassment   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is […]



By: - Dir. Solutions Marketing

Critical Out-of-Band Patch from Microsoft – Update Now!

July 22nd, 2015

No sooner have you digested the latest Patch Tuesday releases than you’re hit by a relatively rare out-of-band patch from Microsoft. As Russ said in his post, it’s definitely a crazy month! This emergency patch corrects a remote code execution (RCE) vulnerability found in all supported versions of Windows – including the soon-to-be released Windows […]



By:

How Do You Protect Your Systems From Ransomware?

July 21st, 2015

In my previous two posts How Does Ransomware Work? Part 1 and Part 2 I described the process ransomware goes through to get on your systems, encrypt your files, and collect your money. Like any malware, all of the steps in the process need to be successful in order for ransomware to work. In the case of […]



By: - Independent Computer Security Analyst

@gcluley

The Hacking Team Android malware app that waltzed past Google Play’s security checks

July 20th, 2015

With every day that passes, more details of the activities of controversial spyware firm Hacking Team come to light, aided by the release of 400 GB of documents, source code and email archives from the hacked firm.



By: - Dir. Solutions Marketing

Infosec Haiku

July 18th, 2015

Anata no joho sekyuritei konshu no haiku Darkode Web Forum – Infamous Hacker Bazaar Gets Smashed FTW!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is […]



By: - Dir. Solutions Marketing

R.I.P. Windows Server 2003

July 17th, 2015

As you should know by now, Microsoft ended support for Windows Server 2003 on July 14, 2015. But surveys suggest that many organizations may not be ready: 50% of organizations started 2015 with no migration plan – or were unaware that support was ending. 1/3 of organizations hope to complete their migrations sometime after the […]



By: - Director, Product Management

@russbernst

Adobe Overshadows ‘Last’ Microsoft Patch Tuesday

July 14th, 2015

In the last Patch Tuesday before users may upgrade their Windows operating systems to Windows 10 on July 29 and subsequently enlist a changed patching process, we have 14 updates to deal with from Microsoft that address 59 total vulnerabilities. Equally as important however are the three 0-days in Adobe Flash Player and an impending […]



By:

How Does Ransomware Work? Part 2

July 14th, 2015

In part 1 I outlined how ransomware gets on your system in the first place. We saw that it operates in much the same manner as other malware: It needs a delivery system, a vulnerability to exploit, a payload to install, and a way to establish communications with a command & control (C&C) server. In […]



By: - Independent Computer Security Analyst

@gcluley

Are You Vulnerable to New Java Zero-Day Exploit?

July 13th, 2015

Operation Pawn Storm is up to its dirty tricks again, this time with what is claimed to be the first new Java zero-day vulnerability in two years.



By: - Dir. Solutions Marketing

Infosec Haiku

July 11th, 2015

Anata no joho sekyuritei konshu no haiku ZeusVM Malware Will Surge Now That Exploit Kit Is Online For Free   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com