This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.

Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!

 

Federal Reserve Bank of St. Louis Confirms a Hacker Attack

The bank confirmed Tuesday that the attack was redirecting users of its online research services to fake websites in this DNS attack.

Trend Micro Releases Q1 Security Roundup Report

The first quarter of 2015 in cybersecurity can be summed up with the phrase, “everything old is new again.” The TrendLabs threat researchers found a resurgence of malvertisements, cryptoransomware and macro viruses. 

The Cybersecurity Domino Effect is Happening

We can no longer worry only about our own organization’s network security, because so many networks are interconnected and interdependent. The Cybersecurity Domino Effect is already happening much more frequently than gets reported.

U.S. Secretary of State Lays out 5 Principles for International Cybersecurity

John Kerry calls on all nations to work together to create a common framework for international cooperation in cyberspace.

47% of Firms Say They Do Not Have Privacy and Data Protection Awareness Training for Employees

Companies are paying more attention to training their employees on how to prevent and respond to cyber incidents. Training is going beyond power point presentations to real-world tests and scenarios.

Government is Especially Worried about the Cybersecurity Skills Gap

Most organizations have already identified security as their top IT concern for this year, but those worries are about to get even more intense. Government and public corporations are especially desperate for skilled security professionals to keep pace. 

CFOs are Collaborating More with their CIOs

Chief financial officers are increasingly collaborating with their chief information officers to manage cybersecurity, establish IT strategies and processes, transition to a digital IT function, and create an analytics-driven organization.

Cybercriminals are Using Steganography to Hide Malware

The most lucrative form of cyberattack is one that can go undetected. Hackers have taken to hiding malicious code in unsuspecting places, like Pinterest and YouTube comments, leaving victims clueless.

Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.



from Trend Micro Simply Security http://ift.tt/1EqsvaF
via IFTTT