Month: May 2017

Surviving the IT Security Skills Shortage

Read full post Cybersecurity professionals are in high demand — and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!

/ May 31, 2017

A Nation State-Looking Cyberattack that Wasn’t

Read full post Symantec researchers uncover a cybercrime campaign with all the hallmarks of a state-sponsored campaign that didn’t even make much money for the attackers.

/ May 31, 2017

Google Arms Gmail Security with Machine Learning

Read full post Google rolls out four security updates to protect enterprise Gmail accounts from phishing, data loss, and other threats.

/ May 31, 2017

Cybersecurity Insurance Lacking at 50% of US Companies

Read full post While half of US security professionals say their companies passed on cybersecurity insurance, the figure is far higher in healthcare, according to a survey released today.

/ May 31, 2017

The Case for Disclosing Insider Breaches

Read full post Too often organizations try to sweep intentional, accidental or negligent employee theft of data under the rug. Here’s why they shouldn’t.

/ May 31, 2017

News in brief: NASA sends probe to the Sun; subway gets phone coverage; Facebook pushes back

Read full post Your daily round-up of some of the other stories in the news

/ May 31, 2017

China’s new cybersecurity law rattles tech giants

Read full post But look no further than Russia for some idea of how US companies will be affected.

/ May 31, 2017

Wolf in sheep’s clothing: a SophosLabs investigation into delivering malware via VBA

Read full post SophosLabs gets under the skin of the bad guys’ latest attempt to drop ransomware on to your PCs

/ May 31, 2017

Mobile App Back-End Servers, Databases at Risk

Read full post Mobile app developers’casual use of back-end technology like Elasticsearch without security-hardening puts unsuspecting enterprises at grave risk of exposure.

/ May 31, 2017

Most Security Pros Expect to Suffer Cyberattacks via Unsecured IoT

Read full post A new report shows the majority of security professionals believe within the next two years they will be victims of DDoS and other attacks due to unsecured IoT devices.

/ May 31, 2017

The Cons of a ‘Silver Bullet’ Approach to Endpoint Defense

Read full post Companies relying on individual security solutions won’t find one is a ‘silver bullet’ that will provide seamless protection.

/ May 31, 2017

Keybase adds end-to-end encryption to messages on the web

Read full post Chrome extension means that users can send encrypted messages on services such as Twitter, Facebook and Reddit that have enabled Keybase

/ May 31, 2017

Rethinking Vulnerabilities: Network Infrastructure as a Software System

Read full post Increasing complexity is putting networks at risk. It’s time to shift our security approach and take some lessons from software development.

/ May 31, 2017

ESET releases decryptor for AESNI ransomware variants, including XData

Read full post ESET has released a decryptor for AESNI ransomware variants, including XData. Victims who still have encrypted files can now download it from ESET’s utilities page. The post ESET releases decryptor for AESNI ransomware variants, including XData appeared...

/ May 31, 2017

Cisco and IBM Team Up on Security

Read full post The two tech titans enter into an agreement to collaborate on technology, services, and threat intelligence.

/ May 31, 2017

What is VPN and how it works?

Read full post Keen to understand what a virtual private network is? You’ve come to the right place. The post What is VPN and how it works? appeared first on WeLiveSecurity

/ May 31, 2017

Chrome bug that lets sites secretly record you ‘not a flaw’, insists Google

Read full post Definitely not a security issue, says Google, as it moves to address flaw that could have you inadvertently starring in someone else’s movie

/ May 31, 2017

Shadow Brokers launch subscription service for fresh exploits, zero-day leaks

Read full post It will only set you back $23,000 per month to join.

/ May 31, 2017

Cash isn’t everything when bug bounties compete with the black market

Read full post As companies fight over skilled eyeballs, money may not actually be the key to securing vulnerability reports.

/ May 31, 2017

Securing the Human a Full-Time Commitment

Read full post Encouraging the people in your organization to make safer cyber decisions requires dedicated brainpower to pull off, SANS study shows.

/ May 30, 2017

Cybercriminals Regularly Battle it Out on the Dark Web

Read full post People operating criminal services on Tor and other darknets attack each other frequently, a study by Trend Micro shows.

/ May 30, 2017

Bot-Driven Online Ad Fraud Losses Decline

Read full post But counterfeit ad inventory the next big worry for online advertisers.

/ May 30, 2017

Bot-Driven Online Ad Fraud Losses Decline

Read full post But counterfeit ad inventory the next big worry for online advertisers.

/ May 30, 2017

News in brief: no laptop ban from EU for now; China warns on new laws; bug bounty scheme for DHS

Read full post Your daily round-up of some of the other stories in the news

/ May 30, 2017

Shadow Brokers double down on zero-day subscription service

Read full post Should you dive in and help with the crowdfunding move to access the data they claim they have? It’s not what we’d advise – but what do you think?

/ May 30, 2017

Cybercrime Costs to Reach $8 Trillion by 2022

Read full post Some 2.8 billion data records expected to be breached in 2017, according to a report released today by Juniper Research.

/ May 30, 2017

Chipotle Dishes Details on Data Breach

Read full post An investigation into the Chipotle security incident announced April 25 confirmed a timeline of attack and type of customer information exposed.

/ May 30, 2017

Security of medical devices ‘is a life or death issue’, warns researcher

Read full post Concern rises as one study finds more than 8,000 vulnerabilities in seven pacemakers while another highlights wider issues in medical devices

/ May 30, 2017

Securing IoT Devices Requires a Change in Thinking

Read full post There’s no magic bullet for IoT security, but there are ways to help detect and mitigate problems.

/ May 30, 2017

Energy and information sabotage: The threats facing our smart cities

Read full post Our cities are becoming smarter, but our security is not following suit.

/ May 30, 2017

Why you should avoid Star Hop and Candy Link in Google Play

Read full post Both games look harmless enough, but they contain a payload that ensures you’ll be hammered with spam

/ May 30, 2017

Tuesday review – the hot 24 stories of the week

Read full post Welcome back after the holiday weekend! Get yourself up to date with everything we’ve written in the last seven days – it’s weekly roundup time.

/ May 30, 2017

New awareness study reveals what you need for the best security programs

Read full post Third annual report educates security awareness professionals on how time, the right talent, and good communications make for the best, most effective programs.

/ May 29, 2017

What do you mean, ‘Windows bug in Linux’? [Chet Chat Podcast 261]

Read full post The Chet Chat is back! Join us for the latest episode of our popular security podcast.

/ May 29, 2017

A simple file naming bug can crash Windows 8.1 and earlier

Read full post The “blue screen of death” lives on thanks to a simple Windows file system bug.

/ May 29, 2017

Crysis ransomware master keys posted to Pastebin

Read full post Why would someone release the keys to victims? Who knows, but as the poster who uploaded them says, ‘Enjoy!’

/ May 26, 2017

Amazon’s app store puts millions of Android devices at risk

Read full post It’s dangerous to go alone outside Google’s protective walled garden, but it’s the price you pay for free software.

/ May 26, 2017

FTC: It Takes Criminals Just 9 Minutes to Use Stolen Consumer Info

Read full post Federal Trade Commission experiment lured hackers to learn about how they use stolen consumer information.

/ May 26, 2017

Elections, Deceptions & Political Breaches

Read full post Political hacks have many lessons for the business world.

/ May 26, 2017