SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

There’s little doubt that the shift to quantum computing  will open new horizons of digital commerce. But it’s also plain as day that the mainstreaming of quantum processing power will profoundly exacerbate cybersecurity exposures. Rel… Continue reading SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

If your daily screen time is split between a laptop browser and a smartphone, you may have noticed that a few browser web pages are beginning to match the slickness of their mobile apps. Related: The case for a microservices firewall Netflix and Airbnb… Continue reading SHARED INTEL: APIs hook up new web and mobile apps — and break attack vectors wide open

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Related: Cyber risks spinning out of IoT Credential stuffing and account takeovers – which take full advantage of Big Da… Continue reading MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Related: The tie between DevOps and SecOps. Org… Continue reading SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks’ analysis of anomalous behaviors

Andrea Carcano’s journey to co-founding a security company in the vanguard of defending critical infrastructure began at a tender age. Related: Why the Golden Age of cyber spying is here Carcano hacked a computer screen at age 14, and that g… Continue reading NEW TECH: ICS zero-day flaws uncovered by Nozomi Networks’ analysis of anomalous behaviors

SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

A faked Rolex or Prada handbag is easy enough to acquire on the street in certain cities, and you can certainly hunt one down online. Now add high-end counterfeit smartphones to the list of luxury consumer items that are being aggressively marketed to … Continue reading SHARED INTEL: Malware-ridden counterfeit phones place consumers, companies in harm’s way

MY TAKE: A primer on how ransomware arose to the become an enduring scourge

“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!” This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city’s servers in May. The attackers demanded … Continue reading MY TAKE: A primer on how ransomware arose to the become an enduring scourge

MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

As long as cyber attacks continue, financial institutions will remain a prime target, for obvious reasons. Related: OneSpan’s rebranding launch Outside of giants JP Morgan, Bank of America, Citigroup, Wells Fargo and U.S. Bancorp, the remainder o… Continue reading MY TAKE: Account hijackers follow small banks, credit unions over to mobile banking apps

MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information we share with them. But that level of trust goes much deep… Continue reading MY TAKE: Microsoft’s Active Directory lurks as a hackers’ gateway in enterprise networks

MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security re… Continue reading MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach