CDSA News Headlines

 

Information Security Culture: It’s Time to Upgrade to 2.0 (Info Security)

Information security requires an approach that involves people, process and technology. But, while we have made great strides in technological advancements in information security,... More

Law Enforcement, Government Agencies See Phishing as Main Cyber Risk (Softpedia)

The Global Cyber Alliance (GCA) was founded at the start of January this year, and on March 19 held its first Strategic Advisory Committee (SAC) meeting. Here, founding members ... More

Malware Attacks More Frequent, Harder To Fight (Information Week)

The frequency and severity of malware attacks has increased "dramatically" since 2011, according to an April 19 State of the Endpoint Report from the Ponemon Institute, sponsored b... More

The Problem With Patching: 7 Top Complaints (Dark Reading)

A term that’s cropped up recently among IT managers is “patching fatigue,” referring to the overwhelming number of patches organizations need to keep their IT environment up-... More

DDoS Attacks: Know Your Enemy (Information Security)

Distributed-denial-of-service (DDoS) attacks are more frequent today than they’ve ever been, according to the latest report by Verisign. In the final quarter of 2015, DDoS attack... More

FBI Paid at Least $1.3M for Zero-Day to get into San Bernardino iPhone (ARS Technica)

FBI Director James Comey suggested to a conference in London that his agency paid more than $1.3 million to gray-hat hackers who were able to unlock the iPhone 5C that was used by ... More

Criminals in the Cloud: How Malware-as-a-Service is Becoming Tool of Choice for Crooks (ZD Net)

Everyone is working to a cloud business model now -- even virus writers. Rather than turning a profit just once by selling a security exploit as a one-off, authors of malicious sof... More

Weekend Vulnerability and Patch Report, April 24, 2016 (Citadel Information Group)

Important Security Updates Apple QuickTime for Window: On April 14, US-CERT advised Microsoft Windows users to remove QuickTime. This followed a report in ars technica that Appl... More

Fortium’s MediaSeal File Security Integrated into FileCatalyst Accelerated File Transfer (CDSA)

Unlimi-Tech Software Inc., an Emmy® award winning pioneer in managed file transfers and Fortium, a leading provider of film and entertainment content security solutions, are pleas... More

Zero-Day Exploits More Than Double as Attackers Prevail in Security Arms Race (ARS Technica)

The number of attacks that exploited previously unknown software vulnerabilities more than doubled in 2015 as hackers raced against security defenders to find effective ways to inf... More

Ransomware Alert: Prevent and Mitigate Ransomware Attacks (U.S.-CERT)

In early 2016, destructive ransomware variants such as Locky and Samas were observed infecting computers belonging to individuals and businesses, which included healthcare faciliti... More

Microsoft Sues U.S. Government Over Gag Orders (Naked Security)

To hell with lying back gagged when the Feds come looking for its customers’ data, and to hell with the passive act of putting out warrant canaries to flag when it’s happening:... More

Facebook’s Working on Auto-Tagging us in Videos (Naked Security)

Has anybody ever captured your image as you lunged at them, screaming “STOP THE TAGGING MADNESS!!”? No? Well, maybe you’ll have more reason to lunge now that the madness i... More

Apple, FBI set to Resume Encryption Fight at House Hearing (CNET)

The encryption battle between Apple and the FBI is moving from the courtroom to Congress next week. Representatives from the tech titan and the federal law enforcement agency ar... More

Who Gets to Define the Terms of Hacking? (The Atlantic)

On March 11, 2013, Thomas Donilon, President Obama’s national-security adviser, gave a speech at the Asia Society on Manhattan’s Upper East Side. Much of it was boilerplate: a ... More

F.B.I. Used Hacking Software Decade Before iPhone Fight (New York Times)

In early 2003, F.B.I. agents hit a roadblock in a secret investigation, called Operation Trail Mix. For months, agents had been intercepting phone calls and emails belonging to mem... More

Meet the $100 Million Cyber Security Startups (CSO Online)

A dozen cybersecurity startups have each raised $100 million or more in funding since 2014, according to Dow Jones VentureSource -- a database that reports on companies globally wh... More

Weekend Vulnerability and Patch Report, April 17, 2016 (Citadel Information Group)

Important Security Updates AVG Free Edition: AVG has released version 2016.0.7539 of its 64 and 32 bit Free Edition. Updates are available on AVG’s website. Comodo Free Fir... More

Cyber Coverage Seen as Security Incentive (Business Insurance)

Congressional interest in promoting cyber insurance as a market-based way to manage business and critical infrastructure risks is growing. That was evident when a subcommittee o... More

Study: Almost Half of Dropped USB Sticks will get Plugged in (Naked Security)

People are still plugging in USB sticks scattered around parking lots, a new study has confirmed. This time, the researchers hail from the University of Illinois. They decided t... More

Sign up for our newsletters
* indicates required
MESA Newsletters