Russian authorities have reportedly sentenced Dmitry "Paunch" Fedotov, the developer of the notorious Blackhole exploit kit that's been linked to large amounts of fraud, to seven years in prison - an unusually severe sentence for online crime in that nation.
Enacting legislation to compel tech companies to help law enforcement decrypt data on mobile devices would diminish America's standing as a moral leader in the world, a nation looked up to by billions of people, even with our many flaws.
The scant - if not conflicting - details and sourcing attached to a recent news report on how the FBI cracked an iPhone 5c have left information security experts questioning both technical details and related agendas.
Is it ever acceptable for ransomware victims to pay a ransom to obtain the decryption key required to restore access to their data? Due to poor preparation, many organizations continue to face that question.
Backed by its own logo, Badlock refers to a set of critical Samba vulnerabilities in Windows and most Unix/Linux operating systems, which attackers could exploit to launch man-in-the-middle attacks against corporate networks.
The proliferation of data everywhere has spawned a collusion of topics around Big Data, Internet of Things (IoT), and the Cloud. And they all have one major thing in common - they need data protection. Considering that more 707 million data records were compromised worldwide during 2015, it is key that data protection...
Security experts are once again warning all Flash users to either update or uninstall the browser plug-in software to protect themselves against active exploit kit attacks that are targeting a zero-day Flash flaw to install ransomware.
Today's hacker ecosystem makes it easy for cybercriminals to share exploit code, newly identified vulnerabilities, and even talent with their co-conspirators. Even novice hackers can leverage these resources to identify vulnerabilities and susceptible organizations, and easily create new zero-day or unknown attacks...
New guidance from the National Institute of Standards and Technology could help make it easier and less expensive for organizations to encrypt and decrypt some forms of data, including Social Security and credit card numbers.
The massive 'Panama Papers' leak demonstrates how law firms are at risk from internal and external attackers seeking to access confidential information. Experts offer insights on how these firms, and others, can better defend their clients' secrets.
Cybercriminals have the bandwidth and technical skills to focus on stealing your organization's sensitive data and they are targeting your endpoints and servers. Often leveraging vulnerabilities in software already running on a system, then are able to gain access and establish persistence on
a machine....
Around the world, organizations are overcoming their security concerns and are taking the leap to cloud computing in order to realize capital expenditure cost savings and leverage a pool of specially trained security monitoring resources. This white paper explores the advantages of using a robust security...
Security intelligence is the act of gathering every available piece of information passing through an organization's network in order to better understand who's doing what with whom. This white paper discusses how security intelligence addresses these shortcomings and empowers organizations from Fortune Five...
What truly affects the cost of a data breach? Ponemon Institute's latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Download this white paper to explore
The three major reasons contributing to a higher cost of data...
What truly affects the cost of a data breach? Ponemon Institute's latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Download this white paper to explore
The reasons why the cost of a data breach...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.