0 Comments
The increased number of firewalls within security infrastructures has created challenges, leaving many organizations struggling with basic firewall management, according to a new report from FireMon. In its fourth annual State of the Firewall report, FireMon polled 334 C-suite executives, IT practitioners and security professionals at global companies of all sizes to understand both the
0 Comments
by Danny Bradbury The Trump administration has rolled back rules that outlined how to launch cyberattacks on other nations. The decision, which has been under consideration for much of the year, could herald a more hawkish approach to cyberwarfare within the US government. Signed in 2012, the original Obama-era Presidential Policy Directive 20 (PPD-20) replaced
0 Comments
Aiming to protect critical infrastructure against attacks Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days. While industrial control protocols themselves are
0 Comments
A new set of Spectre-like flaws that can, theoretically, be exploited to steal sensitive information was discovered in Intel products. Two separate teams of researchers discovered the new vulnerabilities within a few weeks of each other in January and reported it to Intel. Intel was then able to identify two closely related variants and disclosed
0 Comments
The Obama Presidential Policy Directive 20 (PPD-20) that outlined the interagency communications required for the US to deploy cyber-weapons was reversed by President Trump, according to a report from the Wall Street Journal Wednesday 15 August. Infosecurity Magazine contacted the White House for comment, but the Trump administration reportedly has not issued an official statement
0 Comments
Furthering the cause of education in Brazil is the mission that fuels SOMOS Educação’s laser-focused drive toward technology and innovation—and McAfee is playing a pivotal role in that transformation. As CIO Juliano Pereira points out, “Compared to 99% of the educational organizations in Brazil, we are way ahead of the game”—and, in large part, it’s
0 Comments
The first week in security video round-up from WeLiveSecurity Welcome to the first ever week in security video round-up. This weekly video will bring you some of the biggest industry news that we have covered here on WeLiveSecurity. The videos will be presented by ESET’s Global Security Evangelist & Industry Ambassador Tony Anscombe. In this
0 Comments
Sam Thomas, a security researcher from Secarma, has discovered a new exploitation technique that could make it easier for hackers to trigger critical deserialization vulnerabilities in PHP programming language using previously low-risk considered functions. The new technique leaves hundreds of thousands of web applications open to remote code execution attacks, including websites powered by some
0 Comments
Penetration tests help organizations gain a better understanding of how protected they are against cyber-attacks, and when Kaspersky Lab’s performed several dozen cybersecurity assessment tests on corporate networks, it found that the overall level of protection against external attackers was low or extremely low for almost half of the analyzed companies. The report, Security Assessment of Corporate
0 Comments
By Srinidhi, Software Quality Engineer There’s more to life than work.   It’s a commonly held and often stated view, but companies that take it to heart are few and far between. McAfee is one of those few.  Well known as an industry leader, the creator of powerful security technologies and solutions, McAfee also believes it is
0 Comments
Well, there’s something quite embarrassing for Apple fans. Though Apple servers are widely believed to be unhackable, a 16-year-old high school student proved that nothing is impossible. The teenager from Melbourne, Australia, managed to break into Apple servers and downloaded some 90GB of secure files, including extremely secure authorized keys used to grant login access
0 Comments
by Paul Ducklin Sextortion is where someone tries to blackmail you by telling you to pay up or else they’ll reveal something truly personal about your sexuality or your sex life. Recent sextortion scams have tried to amplify your fear by throwing a genuine password of yours into the email, or quoting your actual phone
0 Comments
The modern mom is super-efficient; she manages the home, her profession, family, and a hundred other things efficiently day in, day out. But in recent times, something is playing a spoilsport in this perfect scenario in some cases; and that’s her device. My friend was nostalgic at a party about how she missed her son’s
0 Comments
This post has been updated with a comment from Tesla .  Employees at Tesla’s Nevada gigafactory were allegedly involved in a massive drug ring, stole $37 million worth of precious metals and equipment and illegally spied on former employees at the behest of chief executive Elon Musk, according to a new whistleblower complaint filed against