Impressions From DEF CON 24: The Machines Are Rising

The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.

The post Impressions From DEF CON 24: The Machines Are Rising appeared first on Security Intelligence.

Continue reading Impressions From DEF CON 24: The Machines Are Rising

Using Feedback Loops to Enhance End User Security

Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.

The post Using Feedback Loops to Enhance End User Security appeared first on Security Intelligence.

Continue reading Using Feedback Loops to Enhance End User Security

Exploring Operating Systems for the Internet of Things

As the Internet of Things becomes more prevalent, the demand for the technologies needed to manage and secure devices becomes greater.

The post Exploring Operating Systems for the Internet of Things appeared first on Security Intelligence.

Continue reading Exploring Operating Systems for the Internet of Things

Social Engineering and the Stranded Olympic Traveler

Visitors to the 2016 Summer Olympic Games in Rio de Janeiro should be on high alert for the stranded traveler social engineering scam.

The post Social Engineering and the Stranded Olympic Traveler appeared first on Security Intelligence.

Continue reading Social Engineering and the Stranded Olympic Traveler

The Threat From Weaponized IoT Devices: It’s Bigger Than You Think!

Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?

The post The Threat From Weaponized IoT Devices: It’s Bigger Than You Think! appeared first on Security Intelligence.

Continue reading The Threat From Weaponized IoT Devices: It’s Bigger Than You Think!

Command Injection: A Deadly Needle in the Haystack

Command injection attacks may not get a lot of hype, but they can be seriously damaging to an enterprise that isn’t careful about its security.

The post Command Injection: A Deadly Needle in the Haystack appeared first on Security Intelligence.

Continue reading Command Injection: A Deadly Needle in the Haystack

Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym

IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.

The post Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym appeared first on Security Intelligence.

Continue reading Two Heads Are Better Than One: Going Under the Hood to Analyze GozNym

3-D Printing Vulnerabilities: Build Your Own Breach?

A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.

The post 3-D Printing Vulnerabilities: Build Your Own Breach? appeared first on Security Intelligence.

Continue reading 3-D Printing Vulnerabilities: Build Your Own Breach?

Power Your Response With Incident Visualization

Resilient Incident Visualization graphically displays relationships between indicators of compromise and incidents in an organization’s environment.

The post Power Your Response With Incident Visualization appeared first on Security Intelligence.

Continue reading Power Your Response With Incident Visualization