January 26, 2015 Thousands of Internet-Connected Automated Tank Gauges Vulnerable to Attacks 3 min read - Thousands of Internet-connected automated tank gauges are vulnerable to attacks because they are connected to the Internet without password requirements.
January 22, 2015 Lizard Squad DDoS Operation Brought Down by Weak Security Practices 2 min read - Lizard Squad, an organization that was offering to launch DDoS attacks for a fee, has ironically ended up the victim of a cybercriminal attack itself.
January 22, 2015 State of the Union Address Touches on Cybersecurity 2 min read - President Barack Obama's State of the Union address briefly touched on cybersecurity, but it did not go into as much detail as people were expecting.
January 20, 2015 State of the Union 2015: What Obama Will Say About Cybersecurity 2 min read - The Jan. 20 State of the Union address is expected to focus on the fight against cybercriminals and malware in the wake of recent data breaches.
January 16, 2015 Google Stops Android Patches for Older Versions, Puts Millions of Smartphone Users at Risk 2 min read - Google has reportedly decided to stop issuing Android patches for older versions of the operating system, putting millions of smartphone users at risk.
January 16, 2015 DarkComet Malware Weaponizes #JeSuisCharlie Effort 2 min read - Security researchers say cybercriminals are using the #JeSuisCharlie hashtag's popularity to distribute the DarkComet malware to unsuspecting victims.
January 16, 2015 Report: PCI Noncompliance Common Among Companies That Suffer Payment Card Breaches 3 min read - According to a report from Verizon, many companies that suffer payment card breaches are not actually fully compliant with PCI standards.
January 14, 2015 Skeleton Key Malware Provides Scary Attack Method on Active Directory Users 2 min read - Organizations that only use single-factor authentication for Microsoft Active Directory access could fall victim to the Skeleton Key malware.
January 12, 2015 Pastebin a Convenient Way for Cybercriminals to Remotely Host Malware 2 min read - Experts say cybercriminals are using a popular online repository called Pastebin to act as a remote server for hosting malware aimed at WordPress users.
January 9, 2015 Data Breach Concerns Make InfoSec a Top CIO Spending Priority for 2015 3 min read - Information security is becoming a top CIO priority this year in the wake of several high-profile data breaches that rocked executives' perceptions.