Abundant attention focused on touchless door control solutions today

Abundant attention focused on touchless door control solutions today

Abundant attention focused on touchless door control solutions today | 2021-06-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Understanding the Cloud Security Challenges for SMBs

Understanding the Cloud Security Challenges for SMBs

The events of 2020 didn’t prevent small- to mid-sized businesses (SMBs) from adopting the cloud. Impact Networking reported that SMBs’ overall cloud spending grew 6.3% between 2019 and 2020. Such growth is projected to lead more than a third (35%) of SMBs to annually spend between $600,000 and $1.2 million on public cloud services by the end of 2021, noted Statista. Why Are SMBs Moving to the Cloud? SMBs are turning to the cloud for…

Read More

Experts devised a new attack to bypass Microsoft PatchGuard

Experts devised a new attack to bypass Microsoft PatchGuard

A security researcher discovered a bug in PatchGuard Windows security feature that can allow loading unsigned malicious code into the Windows kernel. Japanese researcher Kento Oki has discovered a bug in PatchGuard that could be exploited by an attacker to load unsigned malicious code into the Windows operating system kernel. The PatchGuard, also known as Kernel Patch Protection, is a software protection utility that has been designed to forbid the kernel of 64-bit versions of Windows…

Read More

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

Introducing continuous remote worker visibility and expanded data collection with Secure Network Analytics Release 7.3.2

We are very excited to announce new Secure Network Analytics features! With release 7.3.2, we have furthered our efforts to extend the zero-trust workplace to anywhere on any device through significant enhancements to Secure Network Analytics’ ability to provide complete and continuous remote worker visibility and have also expanded data collection from integrated Cisco Secure solutions to offer extended visibility beyond the parameters of the traditional network, and more! Preamble: The great network visibility blackout of 2020…

Read More

Rhode Islander Charged with Phishing Political Candidates

Rhode Islander Charged with Phishing Political Candidates

A woman from Rhode Island has been charged with impersonating Microsoft to steal personal information from political candidates and their campaign staff.  Cranston resident Diana Lebeau allegedly sent phishing emails to approximately 22 members of the campaign staff of a candidate for political office in or around January 2020.  In the emails, the 21-year-old allegedly posed as either the campaign’s managers or one of the campaign’s co-chairs. Recipients were directed to enter their account login details into an attached…

Read More

Cryptomining malware up, financial malware down in Q1 2021, Kaspersky finds

Cryptomining malware up, financial malware down in Q1 2021, Kaspersky finds

Bitcoin prices rocketed in early 2021, and so did the number of cybercriminals distributing malware to force infected devices to mine them, with numbers quadrupling from February to March alone. Getty Images/iStockphoto Kaspersky has published a pair of reports detailing the state of the cybersecurity threat landscape in the first quarter of 2021. The first report, detailing desktop attacks, found that cryptomining malware has exploded in popularity, while the second report covering mobile devices, revealed…

Read More

The Future of PCI SSC Mobile Standards

The Future of PCI SSC Mobile Standards

  The Council is currently working on the next evolution of its mobile security standards. To date, PCI SSC has two mobile standards: PCI Software-based PIN Entry on COTS (SPoC) Standard, which provides a software-based approach for protecting PIN entry on the wide variety of COTS devices, and PCI Contactless Payments on COTS (CPoC) Standard which addresses security for solutions that enable merchants to accept contactless payments using a smartphone or other commercial off-the-shelf (COTS)…

Read More

How To Make The Most of Increased Cybersecurity Spend

How To Make The Most of Increased Cybersecurity Spend

The average organization devotes 21% of its IT budget to cybersecurity. By Stu Sjouwerman, CEO, KnowBe4 With the threat of malware touching more and more organizations, boards are beginning to devote greater resources to cybersecurity. The unfortunate truth is that a successful cyberattack can sink a business. The average remediation cost of a ransomware attack, for example, is $1.85 million, according to a Sophos report. The cost of non-compliance if sensitive data is exfiltrated can…

Read More

US Convicts “King of Fraud”

US Convicts “King of Fraud”

US Convicts “King of Fraud” A Russian cyber-criminal has been convicted of running a sophisticated digital advertising scam that defrauded American companies out of millions of dollars. Aleksandr Zhukov used infrastructure spread around the world to trick companies including the New York Times and Comcast into thinking that they were paying for legitimate digital advertising. In reality, Zhukov and his co-conspirators were using coding and domain spoofing to fraudulently obtain revenue.  Zhukov and his co-perpetrators…

Read More

Snort 3: Rearchitected for Simplicity and Performance

Snort 3: Rearchitected for Simplicity and Performance

Over the past 20+ years, Snort has become the de facto standard by which all network intrusion detection systems are measured. The release of Snort 3 in January 2021 represents a significant upgrade to the tried and tested network security tool. Snort 3 includes important updates going so far as to change the entire code base from C to C++. It consists of some entirely new code, some rewritten code, and some code ported to…

Read More
1 3,350 3,351 3,352 3,353 3,354 3,583