Security

Prev / Page 139

November 1, 2018

SECURITY

Five Questions to Ask About Your Data Privacy in the EU

3 min read

The new EU data warehouse for Cisco Umbrella log storage promises to make your life a little less complicated and enhance your data privacy.

October 31, 2018

SECURITY

Vulnerability Spotlight: Multiple Vulnerabilities in Yi Technology Home Camera

1 min read

Vulnerabilities Discovered by Lilith [x_x] of Cisco Talos. Overview Cisco Talos is disclosing multiple vulnerabilities in the firmware of the Yi Technology Home Camera. In order to prevent the exploitation...

October 31, 2018

SECURITY

Anatomy of a sextortion scam

1 min read

By examining sextortion spam campaigns in detail, our researchers were able to understand how criminals operate, and to see why users were tricked into sending them bitcoin despite empty threats.

October 30, 2018

SECURITY

Talos Vulnerability Discovery Year in Review – 2018

1 min read

Introduction Cisco Talos' Vulnerability Discovery Team investigates software and operating system vulnerabilities in order to discover them before malicious threat actors. We provide this information to vendors so that they...

October 30, 2018

SECURITY

Cisco Recognized as a Leader in Incident Response

3 min read

It is never ideal to “go it alone” during a cybersecurity breach. Talk about a high-pressure situation.  Getting access to experts is critical: with a strong support team, you’ll have...

October 29, 2018

SECURITY

GPlayed younger brother is a banker and targets Russian banks

1 min read

Cisco Talos published its findings on a new Android trojan known as "GPlayed" on Oct. 11. At the time, we wrote that the trojan seemed to be in the testing...

October 28, 2018

SECURITY

Secure Access to Any Application With Duo Security

2 min read

Duo Security was started to democratize security and reduce the risk of credential theft, by making it intuitive for end users and easy for admins to deploy, manage and protect any application.

October 27, 2018

SECURITY

War Games: A WOPR of a Security Test (Part 2)

3 min read

Having defined the scenarios, you can see how these could be linked together in different ways to form comprehensive attack vectors.

October 26, 2018

SECURITY

Threat Roundup for October 19-26

1 min read

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Oct. 19 and 26....

Cisco Cybersecurity Viewpoints

Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...

Why Cisco Security?

Explore our Products & Services