HackDig : Dig high-quality web security articles for hacker

Researchers Warn of New Cache-Poisoned DoS Attack Method

A group of security researchers from German universities has devised a new class of web cache poisoning attacks that could render victim services unreachable.The cache is meant to reduce the volume of network traffic through the reuse of HTTP responses and helps applications scale at large, in addition to providing protection against denial-of-service (DoS)
Publish At:2019-10-24 22:15 | Read:154 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Cloud Security Security

Tech, Security Firms Launch Operational Technology Cyber Security Alliance

Several major tech and cybersecurity companies have joined forces for a new initiative called the Operational Technology Cyber Security Alliance (OTCSA), which aims to help industrial and critical infrastructure organizations address challenges related to OT security by providing guidance and resources.Founding members of OTCSA include equipment manufacturer
Publish At:2019-10-23 10:15 | Read:290 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Risk Management Security Arc

Microsoft Invests in Securing Device Firmware

Microsoft is working with PC manufacturing and silicon partners to design devices with a more secure firmware layer.The initiative aims to combat threats that are specifically targeting the firmware and operating system levels with the help of Secured-core PCs, devices that apply security best practices to firmware.These devices, the technology giant explain
Publish At:2019-10-22 22:15 | Read:310 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Security Architecture

Cybersecurity Firms Partner on Open Source Security Technology Development

A group of cybersecurity companies this week announced the Open Cybersecurity Alliance (OCA), a joint effort focused on the development of open source security technologies.Established with initial open source contribution from IBM Security and McAfee and formed under the OASIS (Organization for the Advancement of Structured Information Standards) internatio
Publish At:2019-10-09 12:00 | Read:280 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Security Infrastru

Singapore Lays Out Plans for Operational Technology Cybersecurity

Singapore’s Cyber Security Agency (CSA) on Tuesday unveiled the country’s Operational Technology (OT) Cybersecurity Masterplan, whose goal is to help enhance the security and resilience of organizations that house OT systems.The Masterplan focuses on industrial control systems (ICS), which account for a majority of OT systems. While it’s mainly addressed to
Publish At:2019-10-02 12:00 | Read:249 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Security Architecture Traini

BlackBerry Launches New Cybersecurity R&D Unit

BlackBerry on Monday announced the launch of BlackBerry Advanced Technology Development Labs, a new business unit focusing on cybersecurity research and development.The new BlackBerry Labs will be led by the company’s CTO, Charles Eagan, and it will be run by a team of more than 120 researchers, developers, security experts, architects and product leads.Blac
Publish At:2019-10-01 12:00 | Read:339 | Comments:0 | Tags:NEWS & INDUSTRY Privacy Security Architecture Security I

New Anomali Tool Finds Threat Data in News, Blogs, Social Networks

Threat intelligence firm Anomali on Monday announced the launch of Lens, a new tool designed to make it easier for organizations to find and use threat data from a wide range of sources.Anomali Lens is part of the company’s Altitude solution, which also includes its flagship threat intelligence platform ThreatStream and Match, a breach detection platform tha
Publish At:2019-09-30 12:00 | Read:252 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Virus & Threats Ris

GAO Says Electric Grid Cybersecurity Risks Only Partially Assessed

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks.The report includes the findings of a recently conducted review of the cybersecurity of the national electric grid, which includes “the commercial electric power generation, transm
Publish At:2019-09-27 12:00 | Read:347 | Comments:0 | Tags:NEWS & INDUSTRY SCADA / ICS Virus & Threats Complian

Microsoft to Provide Free Security Updates for Voting Systems Running Windows 7

Microsoft will continue to provide some Windows 7 machines with security updates beyond the January 2020 end-of-support date, and voting systems are among them, the company has announced.On January 14, 2020, Microsoft will cease to deliver security updates for Windows 7 and Windows Server 2008 systems as part of its normal update schedule. It will, however,
Publish At:2019-09-24 00:00 | Read:260 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture Vulnerabilities Ma

Simplifying Security Architectures with SAFE

Safe. The very sound of it resonates with security. It is with some irony that Cisco has decided to reuse the term. Why ironic? For one, there is the idea among security folk that in reality, nothing is entirely safe. Why would Cisco sell intrusion detection if no intruders can, well…intrude? For those of you who remember SAFE from the early days of Cisco, i
Publish At:2016-02-09 17:00 | Read:2519 | Comments:0 | Tags:Security SAFE security architecture

Blended DDoS Attacks Grow in Size, Complexity, Frequency: Report

Multi-Vector DDoS Attacks on the Rise, Survey ShowsWhile multi-vector denial of service (DDoS) attacks have been part of the threat landscape for years, these distributed attacks against enterprise networks are increasing in frequency, complexity and size, Arbor Networks’ 11th Annual Worldwide Infrastructure Security Report (WISR) reveals.According to the re
Publish At:2016-01-26 23:45 | Read:2875 | Comments:0 | Tags:Network Security NEWS & INDUSTRY Security Architecture D

Tor Project to Launch Bug Bounty Program

The Tor Project, the organization behind the Tor anonymity network, announced this week at a security conference that it plans on launching a bug bounty program.Tor Project co-founder Roger Dingledine, Tor Browser lead developer Mike Perry, and the Tor Project’s new executive director Shari Steele on Tuesday held a talk titled “The State of the Onion” at the
Publish At:2015-12-30 20:45 | Read:3072 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture

Bitcoin's 'Blockchain' Tech May Transform Banking

The technology that drives the shadowy cryptocurrency bitcoin is drawing interest from the established banking industry, which sees a potential to revolutionize the sector. Although bitcoin and related virtual currencies are limited to a small set of transactions and are often associated with the underground economy, the so-called blockchain technology is g
Publish At:2015-12-21 01:40 | Read:2510 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture

Microsoft Removes Trust in Root Certificates From CAs

Microsoft on Thursday announced that it plans on removing trust on root certificates issued by 11 Certificate Authorities (CAs) in January 2016. The tech giant explains in a recent blog post that the revoked trust is a consequence of a series of changes to its Trusted Root Certificate Program, which includes more stringent technical and auditing require
Publish At:2015-12-18 19:25 | Read:2305 | Comments:0 | Tags:NEWS & INDUSTRY Security Architecture

Security blends when mobile and PCs converge

Mobile and PC experiences are interbreeding, as our CTO Kevin Mahaffey noted in our cybersecurity predictions. That is, the software — and even hardware — associated with both PCs and mobile devices will soon no longer be distinct versions optimized for specific screen real estate. This year, we predicted that “operating systems and form facto
Publish At:2015-12-15 16:40 | Read:2271 | Comments:0 | Tags:Security mobile operating systems PC security architecture


Share high-quality web security related articles with you:)


Tag Cloud