USB flash drive with the word "virus" inside

Study shows how enterprise can be victimized by dropped USB keys

Security awareness training is a never-ending duty for infosec teams, although some CSOs despair that the message doesn't always get...

August 5th, 2016 Howard Solomon

Huge botnet leveraged thousands of Internet-connected CCTV cameras for DDoS attack

Some infosec pros dismiss worries about the Internet of Things if many devices don't store or transmit personal information. But...

June 28th, 2016 Howard Solomon

#ITWCchats Twitter Recap: Will state-sanctioned hacks make encryption irrelevant?

Update: Thanks again to Nandini Jolly of CryptoMill Technologies Inc. and Laura Tribe of Open Media, and all other participants...

May 31st, 2016 Dave Yin

Spy malware has been delivered through Office macros for a decade: Report

Security teams are being warned of a just-discovered family of malicious Microsoft Office macros which may have been quietly in...

May 4th, 2016 Howard Solomon


Another reminder that attackers use spear phishing for initial compromise

A report this week on the discovery of an espionage group exploiting a vulnerability in several versions of Windows Server...

April 28th, 2016 Howard Solomon

Matrix Style Password Graphic

Alleged attacker posts how-to account of Hacking Team infiltration

There's a saying that nothing on the Internet should be trusted --- at least without verification. So it's up to...

April 18th, 2016 Howard Solomon

Matrix Style Password Graphic

Examining the low cost of cybercrime

If you want to know why attackers are able to outflank CISOs take a look at the latest annual underground...

April 6th, 2016 Howard Solomon

Scott Stevens, Vice President of World Wide Service Provider Sales for Paolo Alto shows the seasonal trends in malware attacks.

Tis the season to be careful – Malware attacks show seasonal peaks

At a Cyber Security conference in Calgary, held by IQPC with CSO Digital and IT World Canada as media sponsor,...

November 4th, 2015 Jim Love

Threat group exploiting hole in satellite security: Report

CISOs have to make sure the service providers they use have secure systems. Now comes word they also have to...

September 10th, 2015 Howard Solomon