Read On to See What Things Are Happening in the World of Security
Check out the latest posts from Security Magazine here!
U.K. Bank Tests Key Fob That Uses Fingerprint to Make Payments
on December 4, 2019 at 5:00 am
U.K. bank NatWest is testing a payment fob that uses biometric fingerprint technology.
University of West Florida and Jikei College Group Partner to Address Global Cybersecurity Workforce Shortage
on December 3, 2019 at 5:00 am
The University of West Florida and the Jikei College Group in Japan announced a partnership that aims to enhance global cybersecurity workforce development.
Fighting Natural Disasters With AI
by firstname.lastname@example.org (Diane Ritchey) on December 1, 2019 at 5:00 am
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?
In Response to Mass Shootings, Increased Security Personnel Isn’t Always the Answer
on November 21, 2019 at 11:06 am
People across the nation are on edge. As of September 2019, the U.S. had seen 283 mass shootings since the start of the year.
Deaths From Terrorism Down, but Number of Countries Affected by Terrorism is Growing
on November 21, 2019 at 5:00 am
Deaths from terrorism fell for the fourth consecutive year, after peaking in 2014. The number of deaths has now decreased by 52 percent since 2014, falling from 33,555 to 15,952, says the 2019 Global Terrorism Index.
Quick Guide for Evaluating Drone Detection: Top 10 Questions to Ask
on November 20, 2019 at 6:00 am
On the surface it may seem like all drone detection systems are the same, but there are important differences.
Cyber Security Case Studies
Read up on the Cyber case studies from Security Magazine here!
Safeguarding Security and Loss Prevention at Gap Inc.
on July 3, 2019 at 4:00 am
How does Keith White, EVP of Loss Prevention at Gap, Inc., manage security across a vast enterprise?
When Physical Intrusions Lead to Digital Breaches
by email@example.com (Ed Finkel) on April 4, 2019 at 4:00 am
Healthcare institutions lock down access through proper ID management and employee training.
How Unified Device Management Is Critical to BYOD Enterprises
on November 1, 2014 at 4:00 am
Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.
Security Implications of the Electric Smart Grid
on September 4, 2014 at 5:00 am
As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.
Defense in Depth: A Layered Approach to Network Security
on September 1, 2014 at 4:00 am
Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.
Krebs on Security News
Read the latest security news from Krebs on Security
The Great $50M African IP Address Heist
by BrianKrebs on December 11, 2019 at 10:31 pm
A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.-based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike.
Patch Tuesday, December 2019 Edition
by BrianKrebs on December 11, 2019 at 1:51 am
Microsoft today released updates to plug three dozen security holes in its Windows operating system and other software. The patches include fixes for seven critical bugs — those that can be exploited by malware or miscreants to take control over a Windows system with no help from users -- as well as another flaw in most versions of Windows that is already being exploited in active attacks.
CISO MAG Honors KrebsOnSecurity
by BrianKrebs on December 10, 2019 at 4:46 pm
CISO Magazine, a publication dedicated to covering issues near and dear to corporate chief information security officers everywhere, has graciously awarded this author the designation of "Cybersecurity Person of the Year" in its December 2019 issue.
Ransomware at Colorado IT Provider Affects 100+ Dental Offices
by BrianKrebs on December 7, 2019 at 9:17 pm
A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, KrebsOnSecurity has learned. Multiple sources affected say their IT provider, Englewood, Colo. based Complete Technology Solutions (CTS), was hacked, allowing a potent strain of ransomware known as "Sodinokibi" or "rEvil" to be installed on computers at more than 100 dentistry businesses that rely on the company for a range of services -- including network security, data backup and voice-over-IP phone service.
Apple Explains Mysterious iPhone 11 Location Requests
by BrianKrebs on December 5, 2019 at 7:46 pm
KrebsOnSecurity ran a story this week that puzzled over Apple's response to inquiries about a potential privacy leak in its new iPhone 11 line, in which the devices appear to intermittently seek the user's location even when all applications and system services are individually set never to request this data. Today, Apple disclosed that this behavior is tied to the inclusion of a new short-range technology that lets iPhone 11 users share files locally with other nearby phones that support this feature, and that a future version of its mobile operating system will allow users to disable it.