The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
The German Web host Hetzner recently notified its clients that its technicians had discovered a backdoor in one of its Nagios internal monitoring systems (h/t The H Security). “An investigation was launched immediately and showed that the administration interface for dedicated root servers (Robot) had also been affected,” Martin Hetzner stated in the notification letter.…
Jeremiah Grossman, founder and CTO of Whitehat Security, has seen a lot of different types of security attacks in his time. He knows the most common types of attacks aren’t necessarily the ones that have the most risk. In its just-released Annual Website Security Statistics report, Whitehat Security provides insight into the attacks it saw…
The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it’s important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. It’s a question the Georgia Institute of Technology addresses…
Enterprises continue to be drawn to the cloud, where data and application management is outsourced to a third party in charge of hardware infrastructure. The cloud has matured to where it now comprises several specialized services described by an alphabet soup of acronyms: SaaS (software-as-a-service), PaaS (platform-as-a-service) and perhaps the least pronounceable of all, IaaS…
When hackers broke in to the New York Times’ network, evaded its anti-virus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: ?Anti-virus software is not that good at keeping systems secure. That means that any company that relies on an anti-virus package to secure its endpoints is exposing itself to…
Webroot’s Dancho Danchev reports that a new underground e-shop has been launched specifically to sell access to hacked PayPal accounts. “The E-shop is exclusively targeting United States citizens, and currently has an inventory of 1,543 hacked PayPal accounts, followed by another 14 for the United Kingdom,” Danchev writes. “The cybercriminals who sell the information provide…
Secure Sockets Layer/Transport Layer Security is the foundational technology that secures Web transactions and communications, but it is not infallible. New research dubbed Lucky13 reveals that SSL/TLS is at risk from a theoretical timing attack that could expose encrypted data. TLS headers include 13 bytes of data used for the secure handshake protocol, said…
Cisco recently published its 2013 Annual Security Report [PDF file], which states that the highest concentration of online security threats target legitimate Web sites rather than pornography, pharmeutical or gambling sites — online shopping sites are 21 times more likely to deliver malware than counterfeit software sites, and online advertisements are 182 times more likely…
In the beginning of the virus era, computer users were introduced to the concept of signature-based anti-virus scanners. It’s an idea whose time may well have come and gone. “Since the 1990s people have used signature-based scanners as their primary line of defense,” said Roger Thompson, chief emerging threats researcher at ICSA Labs, a research…
Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report [PDF file]. The report attributed fully 58 percent of all data stolen, more than 100 million records, to hacktivists. “The most significant change we saw in 2011 was the rise…