Tag: apple

Google and the Zero-Day Conundrum

Last week Google announced a significant change to the way they disclose vulnerabilities. In cases where a zero-day vulnerability has made it into the wild and is being actively exploited, Google will now give a scant 7 days to the software vendor whose product is being exploited before ”…support(ing) researchers (by) making details available so that users can take steps to protect themselves.” We hope that the details Google will make available do not include full disclosu…

Twitter Adds 2FA

Yesterday Twitter announced that it has enabled two-factor authentication for users of their popular service. As we wrote in our Two-Factor Authentication Solution Brief earlier this year: the password as you know it is dead. As we continue to move into a world where literally everything we do touches the Internet in some fashion, companies owe it to their users and customers ways of ensuring they provide safe and secure methods of authentication

App Security Wins Move at Snail’s Pace

Of 200 enterprise security professionals recently surveyed by Enterprise Strategy Group, 79 percent report Web application security attacks in the past year. In a late April Network World blog on the topic, Jon Oltsik, a principal analyst at ESG, said the study also found thieves attacked Web application features and functions such as application authentication, configuration management, application authorization and session management. Oltsik says the good news is that there’s more em…

Cyberattack Tracker Zeroes in on Firewall Vulnerabilities

Deutsche Telekom’s interactive, real-time map of global cyberattacks reveals the bulk of recent attacks – 27.3 million in February alone – were against the Server Message Block (SMB), aka the Common Internet File System (CIFS). Reuven Harrison, CTO and co-founder of Tufin, a security and lifecycle management company and Fortinet solution partner, wrote in a blog that the map’s revelations are significant.