For data security, 2015 is predicted to be as bad or worse as 2014, as more sensitive and confidential information and transactions are moved to the digital space and become vulnerable to attack, according to The Ponemon Institute’s study 2014: A Year of Mega Breaches.
Microsoft has expanded its $100,000 bounty program Monday, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows’ anti-exploit technologies, Computerworld reports.
ATMs hacked to spit out $20s on stage, overriding pacemakers and insulin pumps via laptops – these are just a few of the demonstrations by enterprising hackers at Black Hat, but these presentations often help enterprises more than they hurt.
September 1, 2013
Black Hat, by its name, seems ominous. What was once a conclave of hackers in 1997 has become a fast-growing global conference series focused on the business of cyber security and includes technical presentations on vulnerabilities and solutions.
Advanced Persistent Threats (APTs) are proving traditional cyber attacks (viruses, malware, etc) outdated, according to Larry Clinton, President & CEO of the Internet Security Alliance.
Each minute in 2010 there were 45 new viruses created, 200 new malicious websites established, 180 personal identities stolen, 5,000 new versions of malware created and most importantly, 2 million dollars lost.
Aon Corp. has sold more cyber insurance products in the last year and a half than the five years prior combined, marking an upward trend in enterprises' awareness of cyber threats.
Ignorance is not bliss for companies facing cyber threats; a lack of knowledge of cyber security risks is the most likely cause of a successful malware attack.
Requests for 2,500 absentee ballots, many originating from a few IP addresses overseas, caught the attention of fraud-detection software and election officials as the first cyberattack on an electronic election process.