Category: Uncategorized

California Predicted to Lose $329M to Cybercrime in 2018

Read full post The Golden State will be hit hardest but New York will lose the most money per incident.

/ January 18, 2018

Applying Defense-in-Depth to the Digital Battlefield

Read full post How a layered security strategy can minimize the threat and impact of a data breach.

/ January 18, 2018

Oman’s stock exchange was easily hackable for months

Read full post The security flaw made the securities market an easy target and was only fixed after a security researcher sent more than half-a-dozen warning emails.

/ January 18, 2018

How to Keep Blue Teams Happy in an Automated Security World

Read full post The creativity and intuition of your team members must be developed and nurtured.

/ January 18, 2018

Man Admits to Directing DDoS Attacks Across the US

Read full post New Mexico man pleads guilty to directing cyberattacks against his prior employers, business competitors, and law enforcement agencies.

/ January 18, 2018

Schneider Electric: TRITON/TRISIS Attack Used 0-Day Flaw in its Safety Controller System, and a RAT

Read full post ICS/SCADA vendor discloses in-depth analysis of a recent targeted attack against one of its customers.

/ January 18, 2018

The Startup Challenge: Safe in the Cloud from Day One

Read full post How a Seattle travel company built a rock-solid mobile app without sacrificing performance or security.

/ January 18, 2018

CES 2018 cybersecurity: Now in every single ‘whatchamacallit’

Read full post Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere....

/ January 18, 2018

Yes, Hawaii emergency management stuck a password on a sticky note

Read full post … and nobody bothered to vet the photo taken of that sticky note and distributed by AP.

/ January 18, 2018

Hijackers DM @realDonaldTrump from former Fox News hosts’ accounts

Read full post The hackers tweeted out love for Turkish President Recep Tayyip Erdoğan: “We love turkish soldiers, we love Erdogan, we love Turkey.”

/ January 18, 2018

Google awards researcher over $110,000 for Android exploit chain

Read full post The bug bounty highlighted serious security issues in the Pixel smartphone.

/ January 18, 2018

BlackWallet cryptocurrency site loses users’ money after DNS hijack

Read full post Another site in the booming cryptocurrency wallet sector has been hacked after what looks like a simple DNS hijacking attack.

/ January 18, 2018

Trends 2018: Personal data in the new age of technology and legislation

Read full post The depth of data collected from our online habits could easily allow profiles to be constructed, showing what may be considered extremely personal interests, drawing on information that we don’t realize someone is collecting. The post Trends...

/ January 18, 2018

WatchGuard snaps up DNS security firm Percipient Networks

Read full post The deal is designed to offer better security solutions for SMBs.

/ January 18, 2018

Man pleads guilty to launching DDoS attacks against former employers

Read full post A man had admitted to disrupting domains belonging to former employers, competition, and law enforcement agencies.

/ January 18, 2018

SkyGoFree malware spies on your Android phone and your messages

Read full post The Android malware “SkyGoFree” pretends to be a security update, but it’s actually a powerful spyware and remote control tool.

/ January 18, 2018

Threats from Russia, North Korea Loom as Geopolitics Spills into Cyber Realm

Read full post Threat actors from both nations ramped up their activities sharply in 2017, Flashpoint says in a new threat intelligence report.

/ January 17, 2018

Where to Find Security Holes in Serverless Architecture

Read full post Serverless architectures take away business responsibility for server management, but security should still be top of mind.

/ January 17, 2018

Which CISO ‘Tribe’ Do You Belong To?

Read full post New research categorizes CISOs into four distinct groups based on factors related to workforce, governance, and security controls.

/ January 17, 2018

Living with Risk: Where Organizations Fall Short

Read full post People tasked with protecting data are too often confused about what they need to do, even with a solid awareness of the threats they face.

/ January 17, 2018

One Identity Acquires Balabit

Read full post Union expands One Identity’s privileged access management and analytics offerings.

/ January 17, 2018

One Identity Acquires Balabit

Read full post Union expands One Identity’s privileged access management and analytics offerings.

/ January 17, 2018

How AI Would Have Caught the Forever 21 Breach

Read full post Companies must realize that the days of the desktop/server model are over and focus on “nontraditional” devices.

/ January 17, 2018

Q&A: Mint SIM tackles prepaid wireless with online only approach

Read full post Saving money on wireless service is something most of us want, but how? Mint SIM thinks it has the answer. We recently sat down and talked with Aron North.

/ January 17, 2018

The top 10 security challenges of serverless architectures

Read full post Broken authentication and privileged access without cause are among the most common security concerns.

/ January 17, 2018

Carphone Warehouse faces hefty fine for 2015 breach

Read full post The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised....

/ January 17, 2018

Satori botnet successor targets Ethereum mining rigs

Read full post A variant of the botnet targets rigs to covertly replace their wallet addresses.

/ January 17, 2018

Firefox locks down its future with HTTPS ‘secure contexts’

Read full post Firefox developers must start using ‘secure contexts’ for new features “effective immediately.”

/ January 17, 2018

Twitter denies claims that it snoops on your private messages

Read full post Twitter has pushed back against allegations that its employees “view everything” users post on their servers, including private messages

/ January 17, 2018

BitConnect winds up cryptocurrency exchange operations, BCC crashes

Read full post The closure of the controversial service follows warnings from US regulators and has raised the ire of lenders which consider the move an exit scam.

/ January 17, 2018

CES 2018: Blockchain will solve everything

Read full post The first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day. The post CES 2018:...

/ January 17, 2018

Man charged with selling billions of breached records on LeakedSource

Read full post LeakedSource held some 3 billion stolen usernames and passwords from breaches including LinkedIn, DropBox and more.

/ January 17, 2018

US hospital pays $55,000 to hackers after ransomware attack

Read full post Hancock Health paid up despite having backups available.

/ January 17, 2018

Researchers Offer ‘a VirusTotal’ for ICS

Read full post Free online sandbox, honeypot tool simulates a real-world industrial network environment.

/ January 16, 2018

It’s raining fake missiles: Japan follows Hawaii with mistaken alert

Read full post First the US state of Hawaii; now Japanese broadcaster NHK has issued an erroneous warning about a North Korean missile attack.

/ January 16, 2018

Kaspersky Lab Warns of Extremely Sophisticated Android Spyware Tool

Read full post Skygofree appears to have been developed for lawful intercept, offensive surveillance purposes.

/ January 16, 2018

1 in 9 Online Accounts Created in 2017 Was Fraudulent

Read full post Account takeovers hot, stolen credit cards not.

/ January 16, 2018

Amazon won’t say if it hands your Echo data to the government

Read full post The retail, cloud, and device giant stands as the least transparent of transparent tech companies.

/ January 16, 2018