Cyber Security an...
Follow
1.3K views | +0 today
Cyber Security and Defense
Anything related to cloud and/or security
Curated by Fang Feng
Your new post is loading...
Your new post is loading...
Scooped by Fang Feng
Scoop.it!

Internet Of Things Contains Average Of 25 Vulnerabilities Per Device

Internet Of Things Contains Average Of 25 Vulnerabilities Per Device | Cyber Security and Defense | Scoop.it
New study finds high volume of security flaws in such IoT devices as webcams, home thermostats, remote power outlets, sprinkler controllers, home alarms, and garage door openers.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

6 issues surrounding IoT Security in 2015 - Computer Business Review

6 issues surrounding IoT Security in 2015 - Computer Business Review | Cyber Security and Defense | Scoop.it
CBR looks at what the industry experts think 2015 has in store for the Internet of Things and security.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Cybersecurity: How safe are you?

Cybersecurity: How safe are you? | Cyber Security and Defense | Scoop.it
By CNN Money | There's a new hacker story every day. In the fast paced world we live in, how safe are you really?
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Regin: Stuxnet’s Best Spying Malware Cousin

Regin is a new type of sophisticated malware that deeply embeds itself within a country, company or organization for the purpose of espionage.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Best Security Podcasts (December, 2014)

Best Security Podcasts (December, 2014) | Cyber Security and Defense | Scoop.it
Getting America back on the right track isn't brain surgery--well, maybe it is! On this edition of Family Talk, Dr. James Dobson interviews world-renowned pediatric neurosurgeon Dr. Ben Carson about his story and the future of America.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries

New Phishing Research: 5 Most Dangerous Email Subjects, Top 10 Hosting Countries | Cyber Security and Defense | Scoop.it
With cloud infrastructure easily scalable and rented botnets coming on
the cheap, the cost of conducting massive phishing campaigns continues
to decline for cybercriminals. Even if the return rate is small or the
campaign is poorly executed, phishing can result in serious money for
criminals. Phishing will never simply go away—meaning ongoing headaches
for security professionals....
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Today's Top 5 Malware Threats

Today's Top 5 Malware Threats | Cyber Security and Defense | Scoop.it
To fight malware, security teams must understand it. Here are five especially nasty forms of malware.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Deconstructing the Cyber Kill Chain

Deconstructing the Cyber Kill Chain | Cyber Security and Defense | Scoop.it
As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-centric, malware-prevention thinking.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Best Practices in the Face of High-Profile Breaches

Best Practices in the Face of High-Profile Breaches | Cyber Security and Defense | Scoop.it
Attacks are a mainstream problem, and organizations must employ more than just traditional minimalist approaches of firewalls and virus scanners.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Microsoft reissues fixed Schannel update | ZDNet

Microsoft reissues fixed Schannel update | ZDNet | Cyber Security and Defense | Scoop.it
Problems with the update affected only Windows Server 2008 R2 and Windows Server 2012. The new update does not apply the new TLS ciphers by default.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

3 ways to make your Yahoo Mail account safer

3 ways to make your Yahoo Mail account safer | Cyber Security and Defense | Scoop.it
Following on from our detailed guide to securing your webmail, here's a quick breakdown of how to make the most important fixes, for users of Yahoo Mail.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

How to steal a million dollars (actually, $999,999.99) - no PIN required

How to steal a million dollars (actually, $999,999.99) - no PIN required | Cyber Security and Defense | Scoop.it
Researchers at Newcastle University in the UK have come up with a surprising way of attacking contactless payments.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Critical vulnerability in Git clients puts developers at risk

Critical vulnerability in Git clients puts developers at risk | Cyber Security and Defense | Scoop.it
Malicious Git code repositories can execute rogue commands on client machines interacting with them
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Cloud Security Research – IT is Losing Control of Cloud Data | SafeNet

Cloud Security Research – IT is Losing Control of Cloud Data | SafeNet | Cyber Security and Defense | Scoop.it
A Ponemon Institute study commissioned by SafeNet, Inc. has found that IT staffs are having trouble controlling the management and security of data in the cloud.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Regin: State-Sponsored Malware or Cybercrime? - InfoSec Institute

Regin: State-Sponsored Malware or Cybercrime? - InfoSec Institute | Cyber Security and Defense | Scoop.it
Regin, a highly advanced spying tool A few weeks ago, Symantec security firm published the results of its investigation on the backdoor Regin, a highly adv
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Term Of The Day: 'Google Dorking'

Term Of The Day: 'Google Dorking' | Cyber Security and Defense | Scoop.it
If you are a reasonably competent internet user, there's a very good chance you've done something called Google Dorking.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

10 Free Network Analysis Tools - Network Computing

10 Free Network Analysis Tools - Network Computing | Cyber Security and Defense | Scoop.it
Network management can be a tall task without the right statistics and data about traffic flows, device configurations and user activities. The following utilities offer visibility into various aspects of network activity without breaking the bank. Utilizing these free tools gives network managers a better foothold for improving performance, spotting potential problems and nipping security incidents in the bud.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

What protection can be offered from sophisticated malware such as Regin?

Websense® Security Labs™ researchers are continuing the analysis of a sophisticated malware attack which has been observed to conduct espionage against Russian, Saudi Arabian, and Irish targets, amongst others. Regin, as the malware family ...
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Why You Absolutely Need SSL Certificates for Your Web Services

Why You Absolutely Need SSL Certificates for Your Web Services | Cyber Security and Defense | Scoop.it
Recently I’ve had conversations about SSL certificates with security professionals working for a couple of Pivot Point Security’s clients.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Time To Turn The Tables On Attackers

Time To Turn The Tables On Attackers | Cyber Security and Defense | Scoop.it
As a security industry, we need to arm business with innovative technologies that provide visibility, analysis, and action to prevent inevitable breaches from causing irreparable damage.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Microsoft Issues Emergency Patch Amid Targeted Attacks

Microsoft Issues Emergency Patch Amid Targeted Attacks | Cyber Security and Defense | Scoop.it
Windows Kerberos authentication bug "critical."
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

The Rise Of The Resilient Mobile Botnet

The Rise Of The Resilient Mobile Botnet | Cyber Security and Defense | Scoop.it
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

How to clear out cookies, Flash cookies and local storage

How to clear out cookies, Flash cookies and local storage | Cyber Security and Defense | Scoop.it
This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online.
more...
No comment yet.
Scooped by Fang Feng
Scoop.it!

Google: Manual Account Hijacks Much More Dangerous Than Bot Takeovers

Google: Manual Account Hijacks Much More Dangerous Than Bot Takeovers | Cyber Security and Defense | Scoop.it
Targeted attacks are less common but cause more problems and financial losses for victims than nontargeted mass account takeovers, a new report from Google says.
more...
No comment yet.