The so-called Logjam vulnerability has been making headlines in both the tech and mainstream press since it was announced last week and for good reason. Potentially tens of thousands of websites and mail servers (as well as the users who access them)...
The non-profit Computing Technology Industry Association (CompTIA) issues a semi-annual study on Trends in IT Security, which looks at what is happening in the security market and ways end users and channel firms should be adjusting to the new securi...
[Editor’s Note: While this post is primarily concerned with Fortinet firewalls, particularly the FortiGate 3700D, it also serves as useful background for anyone considering different deployment scenarios for data center firewalls.]
Nestling so...
Two new high-profile hacks this week collectively exposed millions of users’ data, both more worrying than what has become a run-of-the-mill credit card breach. The reasons for concern, of course, are a bit different.
The first breach, announc...
Security has always been a game of balance. The more strict the security, the better the protection it delivers. But that is only true up to the point where users resist, in which case they stop using the security measure and the protection then drop...
As if security advocates didn't have enough headaches, there is a frightening trend of security arguments that sound like they're meaningful but are in reality protecting something that isn't a threat and that users don't care about....
Trust is a tricky thing. It’s hard to gain, easy to lose, and exceptionally difficult to win back. Following the Edward Snowden disclosures and ongoing wrangling in Congress and the courts about privacy, monitoring, and data collection, trust b...
SPSS is one of the most widely used statistical analysis packages in the world. It was first released in 1968 and gained considerable traction among social sciences researchers. It grew steadily in popularity, especially among academics, but when IBM...
If you haven’t heard of Rombertik, you probably had a nice vacation somewhere. A few weeks ago, Rombertik made its rounds in the news everywhere. Lots of articles and blogs were written about it, so out of curiosity, I had a look into it myself...
“I want my MTV...” One of the most iconic lines from one of the greatest rock songs of the 80’s, “Money For Nothing”. OK, not just from the 80’s, but of all time. But rock nostalgia aside, this is the line that pop...
Information is always useful to someone. For 'Tinba', like many botnets, that information could be browsing data, login credentials, or even banking information, all decided by the botnet master and changed to whatever they desire at any time...
In 2009, Egypt slaughtered all 300,000 pigs in the country in response to the worldwide pandemic of so-called “swine flu”, or H1-N1. Some estimates put US pork industry losses at millions of dollars per week as major world markets stopped...
If the Point of Sale (POS) system in your retail business is still running on an older operating system, e.g., Microsoft Windows XP or anything else pre-Win 7, there are a number of compelling reasons why it's long past time to change that.
And...
Cross-site scripting (XSS) vulnerabilities have become fairly commonplace in web applications and crop up frequently in content management systems like WordPress and Joomla! While WordPress is the most popular CMS on the Web, and therefore a popular...