Students from M.I.T. have devised a new way to scour raw code for integer overflows.
Tag Archives: Uncategorized
Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.
The post Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP appeared first on We Live Security.
Say What? Required contents of notice in data breach notifications
With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver useful, readable content, other than a general warning to remain vigilant?
The post Say What? Required contents of notice in data breach notifications appeared first on We Live Security.
Lenovo and Superfish? Don’t panic, you may not be affected
Lenovo’s installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
The post Lenovo and Superfish? Don’t panic, you may not be affected appeared first on We Live Security.
Electronic health records and data abuse: it’s about more than medical info
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
The post Electronic health records and data abuse: it’s about more than medical info appeared first on We Live Security.
Cyber Threat Intelligence Integration Center: will CTICC be a game changer?
Is America’s new Cyber Threat Intelligence Integration Center a step forward? Or a duplication of the National Cybersecurity and Communications Integration Center at DHS?
The post Cyber Threat Intelligence Integration Center: will CTICC be a game changer? appeared first on We Live Security.
Female Skype Avatar Sinks Syria Opposition Fighters
A cyberespionage campaign pulled off by pro-Syrian hackers against Assad opposition fighters used social engineering to steal military planning documents.
U.S. tax identity theft: dodging the $5 billion crime spree
Tax Identity Theft Awareness Week? Yes, tax ID fraud is a real threat to your finances in America today. Putting your tax refund in jeopardy is just one of the impacts.
The post U.S. tax identity theft: dodging the $5 billion crime spree appeared first on We Live Security.
Mobile health IT security challenge: way bigger than HIPAA?
Wearable technology and other health-related devices were big at the 2015 Consumer Electronics Show (CES) earlier this month. This recorded webinar explains why these and related technologies present big challenges for data privacy and security.
The post Mobile health IT security challenge: way bigger than HIPAA? appeared first on We Live Security.
5 reasons not to “hack backâ€
Are hacking victims “hacking back”? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of “hacking back” when he asked me about revenge hacking. As I told Ben, there are several good
The post 5 reasons not to “hack back” appeared first on We Live Security.