The latest technologies and best practices to secure local, virtual, cloud, and hybrid networks.
A recent survey of 2,000 people in the U.S. and the U.K. has found that companies lose over $420 in productivity per employee per year due to workers struggling with passwords — for a 500-person company, that’s a loss of more than $200,000 per year. The survey, conducted by Widmeyer and sponsored by Centrify, also…
If you’ve even a modicum of experience with more than a few versions of Microsoft Windows, you’ve probably heard of Sysinternals and know the name Mark Russinovich. Microsoft acquired Sysinternals in 2006, and today Mark Russinovich is a technical fellow in the Cloud and Enterprise division. While he spends most of his time focusing on…
By Nazar Tymoshyk, SoftServe In today’s technology environment, the question is no longer if your business is vulnerable to cyber security threats or may be attacked someday. The question is when, and will you be prepared. Widespread use of cloud computing, software-as-a-service (SaaS) and smart devices leave businesses of all types and scales more vulnerable…
Sony recently acknowledged that its PlayStation Network and Sony Entertainment Network had been taken offline due to a distributed denial of service (DDoS) attack, stating that the networks had been “impacted by an attempt to overwhelm our network with articifically high traffic.” “We are under attack by a large scale DDoS,” Sony Online Entertainment president…
Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could open an enterprise’s data to attack. At the Black Hat USA conference in Las Vegas this week, security researchers from Adallom will present a workshop…
Look at any recent security update from Microsoft, Google or Mozilla and you will find use-after-free memory errors. These vulnerabilities enable attackers to take advantage of allocated memory after it has already been used. Attackers can potentially leverage that memory space to execute arbitrary code. “We’re seeing more use-after-free memory attacks than we ever have…
The code hosting service Code Spaces was recently forced to shut down permanently after suffering a multi-stage attack on its servers. On June 17, 2014, Code Spaces was hit by a DDoS attack — but as the company soon found, that was just the beginning. The unidentified attacker had also gained access to Code Spaces’…
Lowe’s recently began notifying an undisclosed number of current and former employees that their personal information may have been disclosed when a third-party vendor mistakenly backed up Lowe’s employee data to an unsecured server. The vendor, SafetyFirst, manages an online database called E-DriverFile, which stores compliance information related to current and former drivers of Lowe’s…
According to the results of GFI Software‘s third annual IT Admin Stress Survey, conducted by Opinion Matters, fully 79 percent of IT staff are actively considering leaving their jobs due to job-related stress. That’s a significant increase from 2013, when just 57 percent of respondents said they were actively considering leaving. The survey of 200…
Andrew Ware, 27, of Lauderhill, Fla., was recently sentenced to 70 months in prison, to be followed by three years of supervised release, for his involvement in a stolen identity refund fraud (SIRF) and access device fraud scheme. Ware previously pled guilty to one count each of conspiracy to commit wire fraud, wire fraud, conspiracy…