Home Tags Integrity

Tag: Integrity

How to build your own VPN if you’re (rightfully) wary of...

While not perfect, either, cloud hosting providers have a better customer data record.

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

Six things you need to know about IoT security

Security, trust, and data integrityImage by ThinkstockThe emergence of the internet of things is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to the wide scope of available data ...

Evidence suggests Russia behind hack of French presidential candidate

Russian security firms' metadata found in files, according to WikiLeaks and others.

Annual Verizon security report says sloppiness causes most data breaches

Security threats are constantly evolving, but as Verizon's latest DBIR (Data Breach Investigations Report) shows, the more things change in information security, the more they stay the same.More than half (51 percent) of the data breaches analyzed i...

FDA lashes out at Mylan for dismal quality control at HIV...

Facility making HIV drugs ignored bad quality control data, regulator says.

Lazarus Under The Hood

Today we'd like to share some of our findings, and add something new to what's currently common knowledge about Lazarus Group activities, and their connection to the much talked about February 2016 incident, when an unknown attacker attempted to steal up to $851M USD from Bangladesh Central Bank.

Industry Braces for Repeal of ISP Privacy Rules

Businesses say overturning one of the nation’s strongest internet privacy protection rules will deal a blow to data privacy, security and integrity for businesses and consumers alike.

The Mistakes of Smart Medicine

A technological boom in medicine both encouraged medical institutions to use exclusively information systems in processing data and led to the emergence of new types of technological equipment and personal devices that can be used to interact with traditional systems and networks.

This means that the threats that are relevant for them can also be relevant for medical systems.

Unfixed weaknesses in Confide stoke doubts about end-to-end crypto claims

Confidential messenger service provides no authentication or integrity assurances.

At death’s door for years, widely used SHA1 function is now...

Algorithm underpinning Internet security falls to first-known collision attack.

Bracket Computing Adds Forensic Capabilities to Isolation Platform

The Bracket Computing Cell platform in being expanded to provide organizations with event driven forensics and runtime integrity protection for running applications.