1(630)802-8605 Ravi.das@bn-inc.net

Other Security News

Read On to See What Things Are Happening in the World of Security

Security Magazine

Check out the latest posts from Security Magazine here!

Cyber Security Case Studies

Read up on the Cyber case studies from Security Magazine here!

  • Security Risk Management in Maryland's Seaports
    on June 5, 2019 at 4:00 am

    How does David Espie secure Maryland's seaport while managing more than 1,000 acres, 4,000 entries and exits and billion dollars' worth of cargo? […]

  • When Physical Intrusions Lead to Digital Breaches
    by edfinkel@earthlink.net (Ed Finkel) on April 4, 2019 at 4:00 am

    Healthcare institutions lock down access through proper ID management and employee training. […]

  • How Unified Device Management Is Critical to BYOD Enterprises
    on November 1, 2014 at 4:00 am

     Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway. &nbs […]

  • Security Implications of the Electric Smart Grid
    on September 4, 2014 at 5:00 am

    As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.&nbs […]

  • Defense in Depth: A Layered Approach to Network Security
    on September 1, 2014 at 4:00 am

    Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems. […]

Krebs on Security News

Read the latest security news from Krebs on Security

  • Microsoft Patch Tuesday, June 2019 Edition
    by BrianKrebs on June 12, 2019 at 1:26 pm

    Microsoft on Tuesday released updates to fix 88 security vulnerabilities in its Windows operating systems and related software. The most dangerous of these include four flaws for which there is already exploit code available. There's also a scary bug affecting all versions of Microsoft Office that can be triggered by a malicious link or attachment. And of course Adobe has its customary monthly security update for Flash Player. […]

  • LabCorp: 7.7 Million Consumers Hit in Collections Firm Breach
    by BrianKrebs on June 4, 2019 at 9:45 pm

    Medical testing giant LabCorp. said today personal and financial data on some 7.7 million consumers were exposed by a breach at a third-party billing collections firm. That third party -- the American Medical Collection Agency (AMCA) -- also recently notified competing firm Quest Diagnostics that an intrusion in its payments Web site exposed personal, financial and medical data on nearly 12 million Quest patients. Just a few days ago, the news was all about how Quest had suffered a major breach. But today's disclosure by LabCorp. suggests we are nowhere near done hearing about other companies with millions of consumers victimized because of this incident: The AMCA is a New York company with a storied history of aggressively collecting debt for a broad range of businesses, including medical labs and hospitals, direct marketers, telecom companies, and state and local traffic/toll agencies. […]

  • Report: No ‘Eternal Blue’ Exploit Found in Baltimore City Ransomware
    by BrianKrebs on June 4, 2019 at 12:16 am

    For almost the past month, key computer systems serving the government of Baltimore, Md. have been held hostage by a ransomware strain known as "Robbinhood." Media publications have cited sources saying the Robbinhood version that hit Baltimore city computers was powered by "Eternal Blue," a hacking tool developed by the U.S. National Security Agency (NSA) and leaked online in 2017. But new analysis suggests that while Eternal Blue could have been used to spread the infection, the Robbinhood malware itself contains no traces of it. […]

  • NY Investigates Exposure of 885 Million Mortgage Documents
    by BrianKrebs on May 31, 2019 at 1:58 pm

    New York regulators are investigating a weakness that exposed 885 million mortgage records at First American Financial Corp. [NYSE:FAF] as the first test of the state's strict new cybersecurity regulation. That measure, which went into effect in March 2019 and is considered among the toughest in the nation, requires financial companies to regularly audit and report on how they protect sensitive data, and provides for fines in cases where violations were reckless or willful. […]

  • Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors
    by BrianKrebs on May 30, 2019 at 10:21 pm

    Canadian government regulators are using the country's powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software. […]