News in brief: moving Segway hacked; Google Glass resurrected; 308 Oracle fixes

Read full post Your daily round-up of some of the other stories in the news

/ July 19, 2017

New Cyber Readiness Institute Aims to Improve Risk Management

Read full post The nonprofit will bring together senior leaders of global companies to discuss best practices for managing security employees, processes, and tech.

/ July 19, 2017

Best of Black Hat: 20 Epic Talks in 20 Years

Read full post In celebration of Black Hat’s 20th birthday, we take a look back at the most memorable presentations and demos since the show’s inception in 1997.

/ July 19, 2017

Windows security hole – the “Orpheus’ Lyre” attack explained

Read full post A long-standing bug in the network authentication protocol called Kerberos led to a security hole in Windows, Linux and more.

/ July 19, 2017

Most Office 365 Admins Rely on Recycle Bin for Data Backup

Read full post Nearly 66% of Office 365 administrators use Recycle Bin to back up their data, a practice that could leave data lost and unrecoverable.

/ July 19, 2017

Myspace bug left old accounts vulnerable to attack

Read full post Myspace is still there, and so’s your old account

/ July 19, 2017

Catastrophic Cloud Attack Costs Would Rival that of Hurricane Damages

Read full post Lloyd’s of London estimates multi-billion-dollar loss figures in worst-case scenarios of a major zero-day exploit or massive cloud outage.

/ July 19, 2017

4 Steps to Securing Citizen-Developed Apps

Read full post Low- and no-code applications can be enormously helpful to businesses, but they pose some security problems.

/ July 19, 2017

Police bodycams get tech that can identify “faces and people”

Read full post Bodycams aimed at Police will soon be able to identify stolen bicycles, missing children and other “objects of interest”.

/ July 19, 2017

Want porn? Prove your age (or get a VPN)

Read full post The UK government plans to put age verification in front of pornographic websites from April 2018

/ July 19, 2017

OneLogin: Businesses vulnerable to data breaches by ex-employees

Read full post Businesses leave themselves open to potential data breaches through their ex-employees, according to a new study by OneLogin. The post OneLogin: Businesses vulnerable to data breaches by ex-employees appeared first on WeLiveSecurity

/ July 19, 2017

Rapid7 snaps up security automation platform Komand

Read full post The company hopes that security orchestration and automation will bring in future enterprise revenue.

/ July 19, 2017

Rapid7 Buys Security Orchestration and Automation Firm Komand

Read full post Rapid7 has acquired Komand with plans to integrate its orchestration and automation technology into the Insights platform.

/ July 18, 2017

Flaw in home security system lets hackers remotely activate alarms

Read full post The company appears to have ignored the security report, months after it was filed.

/ July 18, 2017

Rapid7 Buys Security Orchestration and Automation Firm Komand

Read full post Rapid7 has acquired Komand with plans to integrate its orchestration and automation technology into the Insights platform.

/ July 18, 2017

Dow Jones Data Leak Results from Amazon AWS Configuration Error

Read full post Security pros expect to see more incidents like the Dow Jones leak, which exposed customers’ personal information following a public cloud configuration error.

/ July 18, 2017

Dow Jones Data Leak Results from Amazon AWS Configuration Error

Read full post Security pros expect to see more incidents like the Dow Jones leak, which exposed customers’ personal information following a public cloud configuration error.

/ July 18, 2017

Zero-Day Exploit Surfaces that May Affect Millions of IoT Users

Read full post A zero-day vulnerability dubbed Devil’s Ivy is discovered in a widely used third-party toolkit called gSOAP.

/ July 18, 2017

Zero-Day Exploit Surfaces that May Affect Millions of IoT Users

Read full post A zero-day vulnerability dubbed Devil’s Ivy is discovered in a widely used third-party toolkit called gSOAP.

/ July 18, 2017

Apple iOS Malware Growth Outpaces that of Android

Read full post Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

/ July 18, 2017

Apple iOS Malware Growth Outpaces that of Android

Read full post Number of iOS devices running malicious apps more than tripled in three consecutive quarters, while infected Android devices remained largely flat, report shows.

/ July 18, 2017

Google bolsters security to prevent another Google Docs phishing attack

Read full post It’s about to get really difficult to accidentally fall for a phishing attack.

/ July 18, 2017

News in brief: laptop ban curtailed; robot meets a soggy end; Dow Jones leaks 2.2m customers’ data

Read full post Your daily round-up of some of the other stories in the news

/ July 18, 2017

Black Hat USA 2017: what’s on the agenda in Las Vegas

Read full post We’ll be at Black Hat with talks and a shirt giveaway if you give us the right passphrase – come and say hi; we’d love to see you

/ July 18, 2017

Google wants you to bid farewell to SMS authentication

Read full post Google’s shift to a more secure option is welcome, but also adds to the confusion of the post-password world

/ July 18, 2017

Hacked drones flying up, up and away over geofencing restrictions

Read full post Error or brilliant marketing ploy? Either way, drone owners have been able to override geofencing restrictions

/ July 18, 2017

SIEM Training Needs a Better Focus on the Human Factor

Read full post The problem with security information and event management systems isn’t the solutions themselves but the training that people receive.

/ July 18, 2017

SIEM Training Needs a Better Focus on the Human Factor

Read full post The problem with security information and event management systems isn’t the solutions themselves but the training that people receive.

/ July 18, 2017

IoT Security Incidents Rampant and Costly

Read full post New research offers details about the hidden – and not so hidden – costs of defending the Internet of Things.

/ July 18, 2017

IoT Security Incidents Rampant and Costly

Read full post New research offers details about the hidden – and not so hidden – costs of defending the Internet of Things.

/ July 18, 2017

Access all areas – but for how long after you’ve left the company?

Read full post How quickly do you push the big red Delete button on someone’s access after they leave?

/ July 18, 2017

When good extensions go bad: buyer turns Particle into adware

Read full post The tale of what happened when the Particle extension was sold and turned by its buyer into adware is a reminder that it’s a good idea to keep an eye on what you’ve added to your browser

/ July 18, 2017

Hacker steals $7.4 million in ethereum during CoinDash ICO launch

Read full post The hack took only a few minutes but allowed the criminal to escape with millions in investor funds.

/ July 18, 2017

A major cyberattack could cost the global economy $53 billion

Read full post Lloyd’s of London have reported that a serious cyberattack could cost the global economy as much as a devastating natural disaster. The post A major cyberattack could cost the global economy $53 billion appeared first on WeLiveSecurity

/ July 18, 2017

New IBM Mainframe Encrypts All the Things

Read full post Next-generation Z series features the elusive goal of full data encryption – from an application, cloud service, or database in transit or at rest.

/ July 17, 2017

New IBM Mainframe Encrypts All the Things

Read full post Next-generation Z series features the elusive goal of full data encryption – from an application, cloud service, or database in transit or at rest.

/ July 17, 2017

FBI Issues Warning on IoT Toy Security

Read full post IoT toys are more than fun and games and can potentially lead to a violation of children’s privacy and safety, the Federal Bureau of Investigation warned Monday.

/ July 17, 2017

FBI Issues Warning on IoT Toy Security

Read full post IoT toys are more than fun and games and can potentially lead to a violation of children’s privacy and safety, the Federal Bureau of Investigation warned Monday.

/ July 17, 2017

Researchers Create Framework to Evaluate Endpoint Security Products

Read full post Black Hat USA researchers tested more than 30,000 types of malware to learn the effectiveness of endpoint security tools – and they’ll demonstrate how they did it.

/ July 17, 2017