Computer Security Tip of the Day
July 13th
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.
SANS Institute - IT Security Whitepapers
Oops, it looks like you've entered an invalid feed address!
Dark Reading Security News
July 7th
Classic kill chain models that aim to find and stop external attacks don't account for threats from insiders. Here what a modern kill chain should include.
June 23rd
The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.
June 21st
Here's how hackers use network tools and stolen identities to turn a device-level compromise into an enterprise-level takedown.
June 19th
Teaching users why it's important to commit to security controls is a far more effective strategy than simply demanding that they follow them. Here's how.
June 6th
To be held in Chicago Oct. 23-25, defense-focused conference will feature closed-door discussions, co-resident Black Hat Training sessions
New Security Threats
July 14th
Indictments are part of special counsel Robert Mueller's investigation of Russian interference in the 2016 elections.
July 14th
Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has some unusual hallmarks.
July 14th
HackerOne’s 2018 Hacker-Powered Security Report showed that the average award for critical vulnerabilities has increased.
July 14th
The scam emails offer, as proof of compromise, a password associated with the target’s online accounts.
July 14th
In this InfoSec Insider, Tim Bandos looks at why network admins will want to keep a close watch on network traffic within the enterprise.