Targeted attacks, mobile vulnerabilities on the rise, report states
Criminals continue to exploit old vulnerabilities as enterprises, and users fail to keep up with the flood of security updates, the latest Symantec report states.
Criminals continue to exploit old vulnerabilities as enterprises, and users fail to keep up with the flood of security updates, the latest Symantec report states.
IBM's new line of products is designed as an integrated package from the beginning, which is intended to eliminate time and money wasted on operations and maintenance.
A nonprofit initiative to check on SSL implementations finds that 75 percent of those sites are vulnerable to a BEAST attack, and only 10 percent are secure.
The two recent bills, which address cybersecurity standards, research and education, passed with little opposition.
Forget Russia, China and Iran. The real threat to critical infrastructure is a failure to address security fundamentals in the design and operation of U.S. systems, says one analyst.
The first two cybersecurity bills being considered in the House during "Cyber Week," CISPA and the Federal Information Security Amendments Act, passed April 26; two more bills are to be considered today.
Federal agencies have saved an average of $5.5 billion yearly by implementing cloud computing, a modest number next to the $12 billion in potential savings estimated by new research
Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.
Both sides agree on the need to better share threat information, but disagreement on how to protect privacy threatens the bill.
Iran's willingness to attack the United States and its plans for cyber war capability make it a serious threat, a panel of experts said during a House hearing.