The National Institute of Standards and Technology is moving ahead with an initiative to create standards for cryptographic algorithms for small computing devices, such as those found in automobiles, control systems, smart grids and the Internet of Things.
Tens of thousands of Cisco Adaptive Security Appliance devices remain vulnerable to a zero-day exploit released last month as part of the Equation Group toolset dump by Shadow Brokers, according to scans conducted by security firm Rapid7.
An increasing number of sophisticated, high-performance security and content-aware devices are at layers 4
through 7. This calls for, among other things, even greater sophistication of network emulation from test equipment. When Layer 4-7 devices are not properly tested, they face a greater risk for failure within...
In their quest for easy ways to extort victims into giving them bitcoins, cybercriminals continue to double down on crypto-ransomware attacks and increasingly target enterprises, seeking proportionally higher paydays.
You've gone back and forth on encryption, its benefits and challenges, and you've made the decision: to keep your data truly safe, your organization needs encryption. So what now? You've got options available, but what is the best, safest way to implement encryption without disrupting your users' workflow and...
Enterprises must have meaningful conversations about business risk at all levels and across every department. Risk scoring is a fundamental way of normalizing risk to make sense of complex and disparate data. It enables you to standardize reporting, streamline workflows and communicate risk clearly to stakeholders....
The Equation Group tools released by the Shadow Brokers have revealed that the U.S. National Security Agency has been able to decrypt any traffic sent using a Cisco PIX device. While Cisco no longer supports the devices, more than 15,000 remain in use.
Eighty percent of the Android ecosystem - an estimated 1.4 billion devices - is vulnerable to an attack affecting TCP. While the flaw has been patched in Linux, Android remains vulnerable, although Google is aware of the issue.
Obviously, ransomware attackers have no scruples. But the latest attacks go to even further extremes, channeling everything from Hitler to cats, as attackers hone their attempts to shake down Windows and Android users alike.
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest ISMG Security Report.
Do you have $100,000 burning a hole in your pocket and an abiding love of bitcoins? If so, then the U.S. Marshals Service has an offer you can't refuse: Bid on bitcoins seized in some high-profile investigations, including the Silk Road takedown.
The new "No More Ransom" portal is designed to emphasize that police and security firms are doing whatever they can to disrupt ransomware gangs, as well as to help more victims get their data back for free, says Intel Security's Raj Samani.