Thousands of WordPress sites with malware highlight need for comprehensive security

While everyone was worrying about the holiday influx of POS malware, a cyber criminal group quietly exploited a plug-in vulnerability with the mysterious SoakSoak malware and infected at least 100,000 sites utilizing WordPress’s content management system. Researchers with security firm Sucuri discovered the malware campaign in mid-December, noting that it leveraged a flaw within a…

Trapped in social networks

A recent survey of 4,831 active social network users, conducted by Kaspersky Lab in 12 countries, reveals that an overwhelming majority (78%) of respondents considered quitting their social networks — but chose to stay. They wanted to leave for a variety of reasons: 39% of users complained they were wasting too much time, the top…

Key causes of network outages and vulnerabilities

A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. Among the report’s findings, there is almost universal agreement that human factors lead to network outages, and in many cases these outages are quite frequent.

Waterfall BlackBox: Restoring trust in network information

Waterfall Security Solutions announced the launch of the Waterfall BlackBox, developed to maintain the integrity of log repositories in the event of a cyber attack. Based on Waterfall’s patented unidirectional technology, the Waterfall BlackBox creates a physical barrier between networks and logged data, so that stored logs become inaccessible to attackers who are trying to…

Cybercriminals Are Getting Better at Using Advanced Authentication Methods

Cybercriminals are learning how to use newer authentication methods to exploit security weaknesses. As always, it is a cat-and-mouse game with serious consequences. Facial recognition software can be exploited with high-definition photos, many of which can be found on social media accounts. Fraudsters can easily bypass one-time passwords by calling cellphone companies and impersonating the…

Why Unidirectional Security Gateways can replace firewalls in industrial network environments

Unidirectional Gateway solutions come in pairs: the TX appliance contains a laser, and the RX appliance contains an optical receiver. The Gateway pair can transmit information out of an operations network, but is incapable of propagating any virus, DoS attack, human error or any information at all back into the protected network. Waterfall agent software…

The cybersecurity gap between IT capabilities and business expectations

Deloitte has uncovered a shift in business priorities from “business performance” to “customers,” with 57 percent of chief information officers choosing “customers” as their top priority, compared to only 45 percent last year. “Customer” remained the top priority for eight of the 10 industries represented in the survey. Only 45 percent of CIOs stated their…

China’s vague cybersecurity law has foreign businesses guessing

The most disturbing thing for foreign businesses facing China’s new cybersecurity law may just be how vague and broad it is. Under the new law, adopted on Monday and taking effect next June, it’s possible that any major company working in the country might be subject to “security reviews” from the Chinese government.

Securing Black Friday sales: Is your business ready?

Black Friday is the day following Thanksgiving Day in the US, well-known for a variety of promotional sales. These are dependent on Internet connections working, servers coping with demand, in-store bandwidth holding up for transaction processing, and more. Both in-store and online, Black Friday sales are dependent on technology.