An investigation, which concluded that counterfeit network switches were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware. Counterfeit Cisco Catalyst 2960-X series switches F-Secure Consulting’s Hardware Security team investigated two different counterfeit versions of Cisco Catalyst 2960-X series switches. The counterfeits were discovered by an IT company…

Cequence Security announced the general availability of Cequence API Sentinel, a runtime API security solution that delivers continuous run-time API visibility, shadow API discovery, risk analysis, and conformance assessment. With the addition of API Sentinel, Cequence delivers the industry’s only multi-threat API security solution that unifies visibility, vulnerability protection, bot mitigation, and business logic abuse…

DDoS Attacks Less Frequent But Pack More Punch: Report

There were seven times more distributed denial (DDoS) attacks larger than 300 Gbps (gigabit per second) observed during the first six months of 2018 compared to the first half of 2017, NETSCOUT Arbor reveals. According to the security company’s latest threat intelligence report, the number of large DDoS attacks jumped from 7 to 47 year-over-year…

What to do in case of a global security breach

The bitter truth is, everyone in the world is vulnerable to cybercriminals. Even the biggest companies, ones that hold tons of user data, are no exception. On the contrary, they are a likely target. How vulnerable we actually are Have you ever thought about how many global security breaches took place in the past few…

Mastercard introduces cards that work with fingerprints instead of PINs

Mastercard has added fingerprint sensors to its payment cards, in an attempt to make face-to-face payments more convenient and more secure.How does it work? “A cardholder enrolls their card by simply registering with their financial institution. Upon registration, their fingerprint is converted into an encrypted digital template that is stored on the card. The card…

3 overlooked endpoints for cyber attacks and how to protect them

You probably think you have endpoint security covered. After all, organizations have been securing end-user desktop and laptop computers for decades with anti-virus software and other cyber security programs. Because of these steps, you think you’re not at risk of an endpoint-initiated attack. However, NTT Security’s 2015 Global Threat Intelligence Report found that 70 percent…