X-Force November 6, 2017 How Not to Store Passwords: SHA-1 Fails Again 3 min read - Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.
October 31, 2017 Windows Vulnerability Puts NTLM Password Hashes at Risk 2 min read - A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
Energy & Utility October 30, 2017 Addressing the Clear and Present Danger of an Electrical Power Grid Breach 4 min read - Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.
October 18, 2017 Researcher Uncovers Shipping Industry Security Flaws 2 min read - Using a simple online search engine, a researcher exposed several shipping industry security gaps that could leave container ships vulnerable to threats.
Endpoint October 12, 2017 Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM 3 min read - These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.
Fraud Protection October 11, 2017 Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month 2 min read - Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.
X-Force October 10, 2017 The ‘Cracken’: The Evolution of Password Cracking 3 min read - IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene.
Endpoint September 20, 2017 Have We Been Wrong All Along About Good Password Practices? 3 min read - In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.
Identity & Access September 7, 2017 Security Specialists Discuss Identity and Access Management in the Age of Ransomware 7 min read - Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.
August 24, 2017 Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn 2 min read - Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.