Security
Syrian Electronic Army Cracks ShareThis.com GoDaddy Account
ShareThis provides a mechanism for web surfers to share content online through a customizable widget. According to the information on their website, ShareThis interacts with “more than 94% of U.S. Internet users across more than 2 million publisher sites and 120+ social media channels.”…
Cisco Network Threat Defense Training at SecTor 2013
UPDATE: Due to low registration numbers for our training, Cisco Network Threat Defense, at SecTor 2013 we unfortunately had to cancel our course. For those who registered, we appreciate your support and look forward to meeting and delivering the training to you at another venue in the near future.…
How Secure is Your Mobile Worker?
How well do you know your mobile worker? Understanding the mobile worker’s perceptions and behaviors will offer a better view on the potential security implications your organization must manage. Cisco recently released a new global infographic and white paper, the Cisco Connected World Internationa…
The Highs and Lows of the Pump and Dump Scam
The Internet remains an environment where it is important to keep your wits. The recent indictment of nine individuals on stock fraud charges reminds us that the pump and dump scam continues to be perpetrated [1][2]. Stock spam emails were particularly prevalent during the mid-2000’s, with these mes…
Summary: Friend or Foe? When IoT Helps You Get Hacked by Your Security
Businesses of all types and sizes stand to benefit greatly from the Internet of Things (IoT), with a wealth of intelligence for planning, management, policy, and decision-making that will help them maximize productivity and efficiency while minimizing costs. However, if not properly protected by int…
Summary of Microsoft Security Bulletin for August 2013
That’s right folks, today is Patch Tuesday and Microsoft has published its monthly security bulletin for August 2013. The bulletins address a total of 23 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, and Microsoft Exchange. These vulnerabilities could allow an attacker to execut…
DEFCON 21 Wrapup
My first DEFCON was DEFCON Three, held at the Tropicana Hotel in Las Vegas. The computer security conference scene was much, much smaller back then, but DEFCON had already become THE security conference of the year. Since that time I’ve continued to regularly attend DEFCON, and over the years…
DNS Compromise Distributing Malware
DNS records are an attractive target for distributors of malware. By compromising the DNS servers for legitimate domains, attackers are able to redirect visitors to trusted domains to malicious servers under attacker control. DNS requests are served from dedicated servers that may service many thous…
Attend the 2013 PCI Community Meeting for the Latest Core PCI Standards
The Payment Card Industry (PCI) Security Standards Council (SSC) is an open global forum for the ongoing development, enhancement, storage, dissemination, and implementation of security standards for account data protection. The 2013 meeting will focus on the updates to core PCI standards: PCI DSS,…

Why Cisco Security?
Explore our Products & Services

Subscribe to our Blogs
Stay up to date and get the latest blogs from Cisco Security
2