On this week’s episode, CSO’s Salted Hash security writer Steve Ragan talks with CSO’s Michael Nadeau to talk about things that keep IT administrators awake at night. Hint: Ransomware is not the only thing. The items in the episode were pitched to CSO by AppRiver. The data in the list was sourced from working security professionals, […]
A new study from researchers at Princeton’s Center for Information Technology Policy has found that observing keystrokes, mouse movements and scrolling behavior of visitors on Web pages could be loaded with risk.
What is KRACK? Welcome to another manic Monday! Some might say, “welcome to the next dumpster fire.” In any case, if you follow InfoSec security news feeds, you have probably heard of a newly released set of vulnerabilities in the WPA2 wireless authentication protocol. These collectively are know as the Key Reinstallation Attack vulnerabilities or […]
Equifax Breach Overview While not the largest breach, it’s one of the most severe because of the data compromised. Equifax, Experian, and TransUnion compiles the most sensitive financial information and safeguards it. No company is immune to an attack, however, this garnered 143 million American’s most important records. Names, social security numbers, birth dates, and […]
Last week researcher Nitay Artenstein of Exodus Intelligence published a proof of concept for a self-replicating worm that could spread autonomously between mobile devices, needing only the device’s WiFi network address to infect the device. If infected, the device’s WiFi chip would be completely under the attacker’s control, allowing them to propagate the malware to […]