Social Engineering — News

NAS security review: Synology DS1515+ running DSM 5.1-5022

Network attached storage vendor Synology claims to have improved its handling of security issues following last year’s ransomware attacks on its users. CSO Australia and Enex Test Lab put its latest version of DiskStation Manager (DSM) on the new Synology DS1515+ hardware through its paces.

Liam Tung | 05 Feb | Read more

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.

George V. Hulme | 23 Jan | Read more

The week in security: Obama promotes breach sharing, hackers do same

Big-name security tools aren't catching anywhere near all of the malware they are presented with, according to the latest lab testing results from Enex Labs, which found during testing in the second half of 2014 that as many as 100 percent of tested malware was making it through the defences of eight popular security tools. The results were corroborated by a FireEye study that found traditional security defences simply are not stopping security breaches.

David Braue | 19 Jan | Read more

Three elements that every advanced security operations center needs

Security operations centers (SOC) have been around for a while, stretching back to the old room full of live camera feeds. The intent of a SOC is simple: provide the business with the ability to see what is going on in order to take action if necessary. The level of SOC sophistication varied depending on the risks and infrastructure complexity. Consider the humble stretch of road and an analogy for businesses in the very early days of the internet: In low risk, low traffic areas, it was often not necessary to have a constant additional surveillance of this road. Road rules -- basic perimeter-based network security measures like firewalls -- still applied, but it was considered sufficient for any out-of-the-ordinary incidents to be handled reactively.

Michael Lee | 20 Jan | Read more

The Sony leak Scandal - What we know so far

In what has been one of the most momentous years in infosec ever - the Sony hack has topped everything. Although the Sony hack did not impact as many people directly as Apple's "goto: fail" bug or the Heartbleed exploit, the commercial and political ramifications of the attack on Sony have garnered more attention than any other attack - surpassing even the target attack in November 2013.

Anthony Caruana | 25 Dec | Read more

Self-encrypting drives

As data becomes ever more mobile there's an increased risk that it can fall into the wrong hands. And, while there are many technologies to try and prevent this from happening, or tracking a device down if it's lost or stolen, the ultimate solution to data security is preventing it leaving the storage device in the first place.

Ashton Mills | 14 Nov | Read more