The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
The Chinese government recently implemented new rules requiring foreign companies that sell computer equipment to Chinese banks to disclose source code, submit to audits and build backdoors into both hardware and software, according to the New York Times. BBC News reports that the U.S. Chamber of Commerce and other groups have responded with a letter… Read more
At Digital Bond‘s S4x15 Conference last week, researcher Corey Thuen warned of significant security flaws in Progressive‘s Snapshot ODB-II port dongle, manufactured by Xirgo Technologies, which the insurance company uses to track customers’ driving habits. Thuen tested the device on his 2013 Toyota Tundra, and found that it operates with no security at all, according… Read more
By Nazar Tymoshyk, SoftServe For developers and end users of today’s software,?security is a matter of mounting concern, regardless of whether it is private or business data that needs protection. Many people view security exclusively in black and white: Either a system is damaged, or it is safe and sound. However, digging a bit deeper… Read more
Norse Corporation researchers are claiming that a group of six people, including at least one former Sony Pictures employee, was behind the recent breach at Sony Pictures Entertainment. The researchers tracked the activities of the former employee, a systems administrator who had an extensive technical background and knowledge of Sony’s systems, on underground forums where… Read more
The cross-browser testing service BrowserStack was recently breached by an attacker who leveraged his access to send an email to users claiming that the service was shutting down. Claiming to come from the BrowserStack team, the hacker’s email to customers stated, “We have no firewalls in place, and our password policies are atrocious. All virtual… Read more
A recent survey of 2,000 people in the U.S. and the U.K. has found that companies lose over $420 in productivity per employee per year due to workers struggling with passwords — for a 500-person company, that’s a loss of more than $200,000 per year. The survey, conducted by Widmeyer and sponsored by Centrify, also… Read more
If you’ve even a modicum of experience with more than a few versions of Microsoft Windows, you’ve probably heard of Sysinternals and know the name Mark Russinovich. Microsoft acquired Sysinternals in 2006, and today Mark Russinovich is a technical fellow in the Cloud and Enterprise division. While he spends most of his time focusing on… Read more
By Nazar Tymoshyk, SoftServe In today’s technology environment, the question is no longer if your business is vulnerable to cyber security threats or may be attacked someday. The question is when, and will you be prepared. Widespread use of cloud computing, software-as-a-service (SaaS) and smart devices leave businesses of all types and scales more vulnerable… Read more
Sony recently acknowledged that its PlayStation Network and Sony Entertainment Network had been taken offline due to a distributed denial of service (DDoS) attack, stating that the networks had been “impacted by an attempt to overwhelm our network with articifically high traffic.” “We are under attack by a large scale DDoS,” Sony Online Entertainment president… Read more
Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise’s data to attack. At the Black Hat USA conference in Las Vegas this week, security researchers from Adallom will present a workshop… Read more