Friday Squid Blogging: Capturing the Giant Squid on Video
In this 2013 TED talk, oceanographer Edith Widder explains how her team captured the giant squid on video. As usual, you can also use this squid post to talk...
Fortnite Fraudsters Infest the Web with Fake Apps, Scams
Malefactors have doubled down on duping Fortnite enthusiasts, releasing YouTube videos with links to scam versions of the game. And that's not all.
A hacker figured out how to brute force iPhone passcodes
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data.
New Drupal Exploit Mines Monero for Attackers
A new exploit of a known vulnerability gives an attacker control of the Drupal-hosting server.
Malicious App Infects 60,000 Android Devices – But Still ...
A battery-saving app enables attackers to snatch text messages and read sensitive log data - but it also holds true to its advertising.
The Effects of Iran's Telegram Ban
The Center for Human Rights in Iran has released a report outlining the effect's of that country's ban on Telegram, a secure messaging app used by about half...
Supreme Court Bolsters Mobile-Phone Privacy Rights
Supreme Court decision requires law enforcement to obtain a warrant to gain access to cellphone records for tracking citizens.
Cracking Cortana: The Dangers of Flawed Voice Assistants
Researchers at Black Hat USA will show how vulnerabilities in Microsoft's Cortana highlight the need to balance security with convenience.
DDoS-Happy ‘Bitcoin Baron’ Sentenced to Almost 2 Years in...
Far from being a simple hacktivist filled with an impulse for social justice, a different picture emerges when his activity is collated together.
Healthcare Cybersecurity Weekly Briefing 06-22-2018
CI Security Creates Healthcare Board of Advisors  The nine-member board is composed of current and former leaders of hospitals, clinics and insurers, as well...
Financial Services Cybersecurity Weekly Briefing 06-22-2018
Every CPA Firm Needs to be a Security Company These firms often have staff with the knowledge to adequately secure their own environment; however, they rarel...
Public Sector Cybersecurity Weekly Briefing 06-22-2018
3 Tips to Secure Password Management One of the common areas we see companies and technology groups struggling with is passwords.  We know we need them […]
Office 365 users targeted by phishers employing simple HT...
Phishers are using a simple but effective trick to fool Microsoft’s NLP-based anti-phishing protections and Office 365 users into entering their login ...
Roku TV, Sonos Speaker Devices Open to Takeover
The Roku streaming video device and the Sonos Wi-Fi speakers suffer from the same DNS rebinding flaw reported in Google Home and Chromecast devices earlier t...
'Pay Up or Get WannaCry-Hit' Extortion Email Spreading
'Pay Up or Get WannaCry Hit' Extortion Email Spreading
Sophos warns of a 'protection racket' scam email that threatens to infect victims with the ransomware variant if they don't pay the attackers.
The Best Damn IT Security Management Book Period
$18.38 End Date: Sunday Jul-22-2018 8:10:13 PDT Buy It Now for only: $18.38 Buy It Now | Add to watch list
Information Assurance : Managing Organizational IT Securi...
$3.99 End Date: Sunday Jul-22-2018 8:09:44 PDT Buy It Now for only: $3.99 Buy It Now | Add to watch list
IT Security News Blast 06-22-2018
Stepping Up to the Increasing Demand for Managed Security Services Security monitoring holds the key to detecting attacks faster – the true indicator of secu...
China Increases Defense Intelligence Gathering, United St...
​​China increases defense intelligence gathering on the United States; after executive order, the United States moves forward on housing migrant children on ...
White House Email Security Faux Pas?
The Executive Office of the President isn't complying with the DMARC protocol, but that has fewer implications than some headlines would suggest.
Supreme Court says police need a warrant for historical c...
The case was one of the long-awaited privacy legal decisions of the year.
Drupal Vuln Being Used To Deploy Cryptojacking Malware
California Lawmakers Cave To Lobbyists And Gut Net Neutra...
Your Baby Monitor Can Be Hacked Into A Spy Cam
Fake Fortnite Android Apps Spread Across The Internet
New infosec products of the week​: June 22, 2018
ExtraHop Reveal(x) sheds light on the darkspace ExtraHop announced Reveal(x) Summer 2018. The latest release includes new capabilities designed to modernize ...
White House picks new chief to overlook cyber-weapons group
The very existence of the secretive White House group is controversial.
Microsoft Edge bug could be exploited to spill your email...
Since a patch for the flaw has already been released, users are well advised to make sure that they’re running the browser’s most recent version The post Mic...
Why cybercriminals are turning to cryptojacking for easy ...
The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 ...
Banking Trojans and cryptojacking on the rise
A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well ...
Unrestricted access to systems and files exposes organiza...
UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and ...
How to Mitigate Vulnerabilities That Hide in Your IT Systems
By Julia Sowells – Senior Information Security Specialist at Hacker Combat, Software vulnerabilities – issues that every company, every organizat...
Domain Name Stealing at Gunpoint
I missed this story when it came around last year: someone tried to steal a domain name at gunpoint. He was just sentenced to 20 years in jail....
Conventional malware in industrial environments
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
Why cybercriminals are turning to cryptojacking for easy ...
The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 ...
Unrestricted access to systems and files exposes organiza...
UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and ...
Banking Trojans and cryptojacking on the rise
A new report analyzes threat data collected from approximately 750,000 Morphisec protected endpoints globally, between January 1 and March 31, 2018, as well ...
Must Have Factors of a Mobile Security Policy
Mobile devices in the workplace have generated a whole host of cybersecurity issues for companies large and small. Though small and medium sized businesses (...
The new endpoint security market: Growing in size and scope
Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear. Venture capital investments i...
Cylance announced CylanceHYBRID and CylanceON-PREM
Cylance announced the availability of CylanceHYBRID and CylanceON-PREM, two deployment and management options for CylancePROTECT. Cylance’s endpoint security...
CSO Spotlight: Eddie Garcia, Cloudera
Name: Eddie Garcia Company:   Cloudera Job title: Chief Information Security Officer Time in current role: 1 year  Location: Austin, Texas To read this artic...
Thousands of Mobile Apps Expose Their Unprotected Firebas...
Mobile security researchers have discovered unprotected Firebase databases of thousands of iOS and Android mobile applications that are exposing over 100 mil...
Android Gets New Anti-Spoofing Feature to Make Biometric ...
Google just announced its plan to introduce a new anti-spoofing feature for its Android operating system that makes its biometric authentication mechanisms m...
$31 Million Worth of Cryptocurrency Stolen in Cyber Attack
If you trade in cryptocurrency, your funds probably aren’t safe in a public exchange. On June 19th, Bithumb, one of the largest cryptocurrency exchanges in A...
Syniverse launches global private network
Syniverse announced the launch of Syniverse Secure Global Access, a private, secure, global network that provides the foundation for businesses to reliably s...
Destructive Nation-State Cyber Attacks Will Rise, Say Eur...
More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.
Destructive Nation-State Cyber Attacks Will Rise, Say Eur...
More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.
Destructive Nation-State Cyberattacks Will Rise
More than 90 percent of respondents in a Tripwire survey in Europe expect attacks by state-sponsored threat actors to increase in the next 12 months.
Facebook Shores Up Its Position on Fake News Front
Facebook has announced new tactics to reduce the spread of fake news. Its efforts will include combining technology with human reviewers to identify and remo...
Powered by Feed Informer