Latest Articles

Windows 8.1

Attackers Exploiting Windows OLE Zero Day Vulnerability

Attackers are using a zero day vulnerability in nearly all supported versions of Windows in a series of targeted attacks. The flaw is in the OLE technology in Windows and can be used for remote code execution is a targeted user opens a rigged Office file. Microsoft is warning customers that there is no patch available[...]

Read more...

911 outage

April 911 Outage Affected 3.5 Percent of U.S. Population

A catastrophic failure in the emergency call management infrastructure cascaded into an incident that left 11 million out of reach of 911 dispatchers for six hours.

Read more...

shutterstock_108857858

NIST Publishes Draft Hypervisor Security Guide

Categories: Cloud Security

NIST this week published a draft document SP800-125a that makes recommendations for hypervisor security in virtualized environments based on architectural platform choices and configuration options.

Read more...

us capitol

D.C.’s Complicated View of Cyberwar, Regulation, Liability

Former NSA general counsel Stewart Baker shared his insight on Washington’s perceptions of cyberwar during his keynote address at the Cybersecurity Summit in Minneapolis.

Read more...

FTC

FTC Hires Privacy Researcher Ashkan Soltani as Chief Technologist

Categories: Featured, Government, Privacy

The FTC has hired Ashkan Soltani, a highly regarded and respected technologist and privacy researcher, as its chief technologist. The move is the latest in a string of interesting hires by the Federal Trade Commission. In 2009 the agency hired Chris Soghoian, a privacy and security researcher, as its first in-house principal technologist. Soghoian had[...]

Read more...

shutterstock_180696278

Staples Looking into Potential Payment Card Breach

Categories: Data Breaches, Featured

The office supply chain Staples is reportedly looking into a payment data card breach, potentially making it the latest in a long line of retail establishments to suffer a compromise over the last year.

Read more...

webloginGoogle

Google Adds Hardware Security Key For Account Protection

Google is introducing an improved two-factor authentication system for Gmail and its other services that uses a tiny hardware token that will only work on legitimate Google sites. The new Security Key system is meant to help defeat attacks that rely on highly plausible fake sites that are designed to capture users’ credentials. Attackers often go[...]

Read more...