This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
Federal Reserve Bank of St. Louis Confirms a Hacker Attack
The bank confirmed Tuesday that the attack was redirecting users of its online research services to fake websites in this DNS attack.
Trend Micro Releases Q1 Security Roundup Report
The first quarter of 2015 in cybersecurity can be summed up with the phrase, “everything old is new again.” The TrendLabs threat researchers found a resurgence of malvertisements, cryptoransomware and macro viruses.
The Cybersecurity Domino Effect is Happening
We can no longer worry only about our own organization’s network security, because so many networks are interconnected and interdependent. The Cybersecurity Domino Effect is already happening much more frequently than gets reported.
U.S. Secretary of State Lays out 5 Principles for International Cybersecurity
John Kerry calls on all nations to work together to create a common framework for international cooperation in cyberspace.
47% of Firms Say They Do Not Have Privacy and Data Protection Awareness Training for Employees
Companies are paying more attention to training their employees on how to prevent and respond to cyber incidents. Training is going beyond power point presentations to real-world tests and scenarios.
Government is Especially Worried about the Cybersecurity Skills Gap
Most organizations have already identified security as their top IT concern for this year, but those worries are about to get even more intense. Government and public corporations are especially desperate for skilled security professionals to keep pace.
CFOs are Collaborating More with their CIOs
Chief financial officers are increasingly collaborating with their chief information officers to manage cybersecurity, establish IT strategies and processes, transition to a digital IT function, and create an analytics-driven organization.
Cybercriminals are Using Steganography to Hide Malware
The most lucrative form of cyberattack is one that can go undetected. Hackers have taken to hiding malicious code in unsuspecting places, like Pinterest and YouTube comments, leaving victims clueless.
Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.
from Trend Micro Simply Security http://ift.tt/1EqsvaF
via IFTTT