Top News:

Ask Mr. Security Answer Person with John Pescatore

John Pescatore takes a look at the top security, privacy and risk issues when answering questions posed by information security professionals.  

The latest column answers a question on strong authentication that many CISO’s will start to hear from their CEOs (and from their own spouses).

Submit questions to:

Read Now 

Free On-Demand Webinar on the Heartbleed Bug

This free webinar hosted by security analyst Richard Stiennon features Lance James, the Head of Cyber Intelligence at Deloitte.

They discuss the severity of the Heartbleed vulnerability, its repercussions for open source software and responsible disclosure and ways to remediate.

As you'll hear -- time to change those passwords.

Register Now 

The securitycurrent Podcast

Listen to our latest podcast with Gartner Research VP Anton Chuvakin on PCI DSS Version 3.

He talks about the changes in the latest Payment Card Industry Data Security Standard version, how the standard has made real progress in fostering security and what to look forward to in the future with mobile processing.

Also, check out our other podcasts and hear interviews with Pwnie Express, Mocana, Trend Micro, Trend Micro and more.

Listen Now 

Federal Banking Regulators Warn of Increased Attacks on ATMs

By Fahmida Y. Rashid

Cyber attackers are withdrawing large amounts of money using stolen debit card information, often times exceeding ATM limits or even the amount the victim has in the account, the Federal Financial Institutions Examinations Council said in a statement.

Read More 

Where are the US Tech Heroes? 

By Richard Stiennon

It has been three months since the world learned that the NSA's Signal Intelligence Directorate, through its Tailored Access Operations has been deploying backdoors in Cisco, Juniper, Huawei, Dell and several other hard drive manufacturer's gear. The response for them so far?

Read More 

Cyber Policy Experts to Follow on Twitter 

By Richard Stiennon 

The emerging field of cyber policy is attracting government, academic and technology experts. Here is our list of cyber policy experts from around the world who are well worth following on Twitter.                            

                                                                                             Read More 


Information Sharing

Why is Congress so hot on information sharing?

Clone Wars

Robolawyers acting as lawyer, judge and executioner.


Hackers Increasingly Turn to Darknet 

Black Market Growing. 


Evidence Appearing That NSA Knew About Heartbleed Bug

By Richard Stiennon

While Bruce Schneier may have been jumping to conclusions when he said“At this point, the probability is close to one that every target has had its private keys extracted by multiple intelligence agencies.”

It did not take long for at least a couple of traces of recorded network traffic, as reported by Ars Technica, to provide at least a smoking gun. 

And now Bloomberg is reporting that they have “two sources familiar with the matter” that claim the NSA has been exploiting the HeartBleed bug almost since it was first introduced into OpenSSL.

Read More 


FFIEC Notifies Financial Institutions of Continued DDoS Attacks

By Mike Saurbaugh 

The US Federal Financial Institution Examination Council's (FFIEC) recent guidance on distributed denial of service (DDoS) attacks, provides financial institutions with at least six-steps as part of their responsibility to mitigate risk.

The announcement in a press release outlines expectations to ensure businesses are aware of DDoS attacks and then expects organizations to conduct a risk assessment.

Read More  


About securitycurrent | Privacy Policy