Human Risk Management Blog

IT Security

Get the most current news about the IT Security industry, what the latest threats are and what that means to security professionals.

Apple Defies U.S. Magistrate's Order To Unlock Shooter Suspect's iPhone

Apple this week released a statement regarding what has been an ongoing battle for months. The FBI requested that Apple unlock the encypted iPhone belonging to San Bernadino shooter Syed ...

Top 10 Predictions for 2016: Read It, This Is A Good One

At the end of the year I spend a few days reading all the IT security pundit's 2016 predictions and synthesize them with my own perspective. The Crystal Ball issue is the shortest of the ...

Stop End-Users From Doing Stupid Stuff

Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and ...

WSJ Gives Powerful Ammo For More InfoSec Budget

A front page article in the Wall Street Journal describes the escalating arms race for a possible cyberwar. This article is a great way to get C-level execs a crash course about ...

[INFOGRAPHIC] Security of The Internet of Things (IoT)

The Internet of Things is far from secure. Don't trust me, just check the FBI, they are getting worried about this too. I have talked about hacks of Internet enabled devices before, ...

This Weekend's Microsoft Windows 10 Upgrade Nightmare

OK, so I decided to upgrade my plain vanilla Dell XPS box that I bought 2 years ago, running Windows 8.1. Enough memory, nothing special installed. Upgraded using the "Get Windows 10" ...

Confidence In Antivirus Falls To All-time Low

Bromium is a company with a new antivirus mousetrap, so it will try to make old mousetraps look, well... old. However, they do point out correctly that traditional antivirus is starting ...

How The NSA Killed Internet Security in 1978

Here is a very short summary of Internet security which explains why the current version of the Internet is not secure. It was not built securely from day one because the NSA objected to ...

The Information Security Policy Trap

InfoSec genius Ben Tomhave wrote: "It's that time of year again: time to update the policies! This annual exercise is always a source of great enjoyment for me (no, not really). After ...

Why your brain shuts down when you see a security alert

Been mystified why end-users do not seem to get it? Their eyes glazing over when a security alert pops up on their screen? Brand new neuroscience research using MRI shows a dramatic drop ...

Antivirus Products Are Slow at Making Malware Signatures

The traditional malicious software detection approach is far from being sufficient, especially in corporate environments. More and more it's found that antivirus products can take months ...

AV-TEST: "There are now 12 million new malware variants per month"

The AV-Test reported that they found 143 Million new malware samples in 2014 and 12 million new variants per month.

Antivirus Isn't Dead, It Just Can't Keep Up

A few months ago, a company called LastLine Labs published some explosive data about antivirus products. They studied hundreds of thousands of pieces of malware for a year, and tracked ...

[InfoGraphic] The Most Used InfoSec Words In 2014

We took almost 25,000 Hackbusters #infosec articles from 100+ feeds in 2014 and tabulated the hot topics. This "word-cloud" infographic is the result! What's Really The #1 Hot InfoSec ...

Ransomware Beats APT In Terms Of Severe Impact

MalwareBytes Research showed that in the year 2014, 82% of companies were attacked online. Their research also showed that browser vulnerabilities will be the biggest challenge going ...

Top 10 InfoSec Pain Points

The New Stuxnet Discovered Called Regin How Does It Work?

What's -Really- The #1 Hot Security Topic?

There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site ...

A cybersecurity video you should really watch

Cybersecurity as Realpolitik by Dan Geer at Black Hat USA 2014

NSA's Monstermind Aims To Detect And Stop Cyber Attacks Instantly

WIRED magazine had the scoop, by directly talking to Edward Snowden recently. An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.