What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-07-04 14:00:00 Four Reasons to Use Security Ratings Before Your Next Acquisition (lien direct) For years, cybersecurity was considered a “check-the-box” discussion during the merger and acquisition (M&A) process. It was almost always examined to ensure there weren't any glaring issues or major red flags-but due to limited time resources, or the ability to parse out qualitative responses during M&A from real performance, there wasn't a great deal of ...
itsecurityguru.webp 2018-07-03 15:29:01 Cyber security is a matter for the boardroom, not the IT team. Executives must take a hands-on role (lien direct) Few business risks today have the destructive capability of a cyber attack. Yet, for many organisations, cyber risks remain obscure, low priority, and are frequently seen as the domain of IT departments to manage. View Full Story  ORIGINAL SOURCE: City AM ★★★★★
itsecurityguru.webp 2018-07-03 15:27:01 IoT and malware top the worries list for industrial tech firms (lien direct) Industrial players, like power plants, manufacturers or water treatment centres, are embracing IoT at a great pace, but failing to consider security issues, new research has said. A report by Kaspersky Lab has claimed that while these types of organisations turn more towards IoT, they're not doing enough to protect these investments, which makes them a sitting ... Malware
itsecurityguru.webp 2018-06-29 10:14:03 UK Government Sets Minimum Cybersecurity Standard (lien direct) The UK government has launched a new cybersecurity standard designed to set a baseline of mandatory security outcomes for all departments. The Minimum Cyber Security Standard announced this week presents a minimum set of measures which all government departments will need to follow, although the hope is that they will look to exceed these at all times. ... ★★
itsecurityguru.webp 2018-06-27 10:11:02 Cybersecurity pros are limiting their personal use of Facebook, survey says (lien direct) About 65% of surveyed current and former attendees at the annual Black Hat USA security conference say they're limiting their use of Facebook or not using it at all after the recent controversies over the company's security practices, Black Hat reports. The organization has surveyed its attendees on security matters annually since 2015, and the majority ... ★★★★
itsecurityguru.webp 2018-06-27 10:08:02 FireEye hacked off at claim it hacked Chinese military\'s hackers (lien direct) US security company FireEye has denied a claim aired in a new book that it hacked into laptops owned by Chinese military hackers. It’s common knowledge that prior to its acquisition by FireEye, the security concern Mandiant brought the Chinese operation known as APT1 undone. In its 2013 report, the company attributed espionage against 141 companies ...
itsecurityguru.webp 2018-06-27 10:06:03 Boston-founded tech firm suffers one of state\'s worst data breaches in years (lien direct) More than 120,000 Massachusetts residents are affected by a recent data breach at the handyperson-for-hire site TaskRabbit, making it the largest breach in the state so far this year, according to new data from Massachusetts regulators. San Francisco-based TaskRabbit, which launched in Boston in 2008 and is now owned by furniture giant Ikea, announced in April that ... Data Breach
itsecurityguru.webp 2018-06-27 10:04:01 New Zealand\'s Z Energy flags possible data breach in November (lien direct) New Zealand-based fuel supplier Z Energy Ltd on Wednesday said it has been presented with evidence that customer data from its Z Card Online database was accessed by a third party in November 2017. The database held customer data such as names, addresses, registration numbers, vehicle types and credit limits with the company, Z Energy ... Data Breach
itsecurityguru.webp 2018-06-27 09:49:05 Russia Suspected in German Energy Firm Hacks (lien direct) Last fall, energy companies in several countries, including Germany and the United States, found out via a cybersecurity report from Symantec that hackers had figured out a way to breach their infrastructures. These hackers could potentially switch off the power grids at those establishments and wreak havoc on their computer systems. Now, more recent news ...
itsecurityguru.webp 2018-06-27 09:38:03 CISO Chat – Quentyn Taylor, Director Information Security for Canon EMEA (lien direct) On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO's and senior security experts to get ... Guideline
itsecurityguru.webp 2018-06-27 09:28:00 Six Methods to Create a Secure Password You\'ll Actually Remember (lien direct) Anyone who has ever held an ATM card, created an email address, opened an online bank account, or joined a social media website know how important passwords are. We know that passwords open the gates to our digital life, and we should never share them to just about anyone, or any person at all if ...
itsecurityguru.webp 2018-06-26 09:05:03 Awareness is not enough to thwart cybersecurity (lien direct) By Tim Brown, VP security at SolarWinds MSP Every year, the entire month of October is given over to Cybersecurity Awareness-a campaign dedicated to promoting information security and safer use of the internet by everyone. But is it having an effect? Are UK businesses more aware of-and better prepared for-the cyberthreats they face? The answer ... ★★★
itsecurityguru.webp 2018-06-25 10:05:05 UK warned to boost defence spending as security threat rises (lien direct) Professor Peter Roberts, director of military sciences at the Royal United Services Institute, warned that Britain will struggle to cope with emerging threats without a massive increase in spending. Speaking ahead of a naval arms fair in Glasgow, he said the UK would need to invest 10 per cent of gross domestic product (GDP) on ... Threat
itsecurityguru.webp 2018-06-25 10:04:00 Med Associates Suffer Data Breach: 270,000 Records Left Exposed (lien direct) Cyber attacks on the health care sector have continued into this week too. The latest attack resulted in the compromise of approximately 270,000 patient records after Med Associates suffered a data breach. The firm confirms that the breached data may have included personal details of the patients. View Full Story ORIGINAL SOURCE: Latest Hacking News
itsecurityguru.webp 2018-06-25 10:01:05 New Bug Uncovered by Security Researcher Allows iPhone Passcode to be Hacked (lien direct) A security researcher took to his Twitter account on Friday to reveal a bug on iOS devices that can allow passcodes to be bypassed through a brute force attack. The video demonstration caused Apple to push back calling the finding an “error.” Co-founder of cybersecurity firm Hacker House Matthew Hickey posted a video where he exhibited a method ...
itsecurityguru.webp 2018-06-25 09:59:01 Smartphone batteries can reveal what you typed and read (lien direct) A group of researchers has demonstrated that smartphone batteries can offer a side-channel attack vector by revealing what users do with their devices through analysis of power consumption. Both snitching and exfiltration were described in this paper (PDF), accepted for July’s Privacy Enhancing Technologies Symposium. View Full Story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-06-25 09:46:05 (Déjà vu) F5 Labs research reveals Chinese hackers lead attacks on IoT devices (lien direct) Research released today from F5 Labs has found Telnet brute force attacks against IoT devices, led by Chinese hackers have risen a staggering 249% since 2016. Findings from the latest Threat Intelligence report shed light on the challenges vulnerable IoT devices place on businesses, as the proliferation of brute force hacks both intensify and become ... Threat
itsecurityguru.webp 2018-06-25 09:45:01 Evaluating the geopolitical scene as a security and risk decision maker (lien direct) Political and social instability in the world is spilling over into businesses, which more than ever must contend not only with hackers targeting valuable corporate data, but also how geopolitical conflicts will affect the reliability of digital networks supporting commerce, how policy is formulated and enforced, and how investments are executed. The relatively quiet first ...
itsecurityguru.webp 2018-06-25 09:42:00 Combatting the increasing volume of DDoS attacks (lien direct) As attacks are getting more sophisticated, so must our defences   The threat to corporate networks from DDoS attacks has never been greater. Despite some wins of recent, such as the takedown in April of Webstresser – an online DDoS-as-a-service website, organisations cannot take their guard down.   Such a service meant that criminals could ... Threat
itsecurityguru.webp 2018-06-22 10:23:00 Does colocation have a role to play in a cloud-based world? (lien direct) Despite the inevitability of a cloud-based computing future, organisations are still hesitant to abandon their existing on-premises infrastructures, whether it be for security and/or compliance issues or due to workloads that don't lend themselves well to virtualised platforms. Thankfully there is a middle ground. A colocation to cloud strategy is about enabling companies to locate ...
itsecurityguru.webp 2018-06-22 10:21:02 Why Infosec Practitioners are Evolving into Data Scientists (lien direct) Data scientists and information security practitioners have long operated in their own independent spheres of influence. When you look at their responsibilities, however, you begin to see they are more alike than different. A data scientist is someone who analyzes and interprets complex data to assist a business in its decision making, which is similar ...
itsecurityguru.webp 2018-06-22 09:11:04 Fire TVs of Amazon Overrun with Extracting Malware (lien direct) Recently to prevent cryptocurrency extracting malware from functioning on the gadgets of naïve users, Apple andGoogle have applied new policies. Both have set forbidden on any application or extension — for Googleits Chrome extensions and for Apple every gadget — associatedwith mining, ever though the applications are functioning as per rules. View Full Story ORIGINAL ... Malware ★★★★
itsecurityguru.webp 2018-06-22 09:08:04 ACLU wants to keep your phone safe from sneaky government malware (lien direct) The balance between security and law enforcement is often an issue for tech companies. The American Civil Liberties Union wants to tip the scales in security’s favor. On Thursday, the ACLU released its guide to developers on how to respond to government demands when the requests require companies to compromise their own security. It happens a lot ... Malware ★★★
itsecurityguru.webp 2018-06-22 09:05:04 A Third of UK Orgs Have Sacked Employees for Data Breach Negligence (lien direct) Almost a third of UK organizations have sacked an employee as a result of data breach negligence, according to new research from Shred-it's Security Tracker report. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Data Breach ★★★
itsecurityguru.webp 2018-06-22 09:04:03 270,000 Put at Risk by Med Associates Healthcare Data Breach (lien direct) A healthcare data breach at Med Associates, a Latham, NY-based health billing company, may have exposed PHI on more than 270,000. View Full Story ORIGINAL SOURCE: Health IT Security Data Breach ★★★
itsecurityguru.webp 2018-06-21 13:10:02 DDoS Defence Demands a Hybrid Approach (lien direct) By Ronald Sens, EMEA Director, A10 Networks Just imagine that a DDoS attack is crushing your network. Your enterprise's internet pipe is under siege and almost to capacity. There is nowhere else for the traffic to go, making it impossible for legitimate user traffic to get through. So, what is the result? The attack is ... ★★
itsecurityguru.webp 2018-06-21 13:09:00 Younger employees identified as main culprits for security breaches in the workplace (lien direct) More than a third of senior executives believe that younger employees are the “main culprits” for data security breaches in the workplace according to a new independent study into attitudes of the next generation workforce about cybersecurity, commissioned by Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access. More worrying ... Guideline ★★★★★
itsecurityguru.webp 2018-06-21 13:07:03 New vulnerabilities in Phoenix Contact switches endanger industrial networks (lien direct) Phoenix Contact, a German electrical engineering and automation company, has disclosed four vulnerabilities in FL SWITCH industrial switches. These devices are used for automation at digital substations and in oil and gas, maritime, and other industries. The vulnerabilities were discovered by Positive Technologies experts Vyacheslav Moskvin, Semyon Sokolov, Evgeny Druzhinin, Ilya Karpov, and Georgy Zaytsev. ... ★★★★
itsecurityguru.webp 2018-06-21 13:02:03 Texas cancer center faces $4.3M fine for data breaches (lien direct) Federal health officials have ordered the University of Texas MD Anderson Cancer Center to pay a $4.3 million fine for failing to secure health records stemming from data breaches. The Houston Chronicle reports the U.S. Department of Health and Human Services announced Monday that MD Anderson's failure to encrypt health records violated the 1996 patient privacy law known ... ★★
itsecurityguru.webp 2018-06-21 13:01:04 Employers Should Reward Staffers Who Dodge Online Scams, Thwart Ransomware, Study Shows (lien direct) Weak passwords and phishing are two of the most popular attack vectors for cybercriminals looking to steal financial information – in the case of regular users – or sensitive data such as medical records – in situations where bad actors are seeking to profit from extortion or ransomware. OpenVPN, the group behind the popular virtual private ...
itsecurityguru.webp 2018-06-21 13:00:05 Most small businesses fail to act after a cyber attack (lien direct) Nearly two-thirds (65%) of small businesses in the US fail to act following a cyber security incident, according to the 2018 Hiscox small business cyber risk report. The report also reveals that 47% of more than 1,000 small businesses polled had suffered at least one cyber attack in the past year, and that 44% that reported a ...
itsecurityguru.webp 2018-06-21 12:56:05 This new Windows malware wants to add your PC to a botnet – or worse (lien direct) A new malware campaign is roping systems into a botnet and providing the attackers with complete control over infected victims, plus the ability to deliver additional payloads, putting the victims’ devices at risk of Trojans, keyloggers, DDoS attacks and other malicious schemes. The malware comes equipped with three different layers of evasion techniques which have ... ★★★★★
itsecurityguru.webp 2018-06-21 12:55:01 Please tighten your passwords and assume the brace position, says plane-tracking site (lien direct) Aviation professionals enthusiasts have been told to change their passwords after flight-tracking site flightradar24/ warned of a data breach. The site offers real-time visualizations of commercial flights in transit with a freemium model. Subscribers get access to more historical data or to a package of services aimed at aviation professionals. However some subscribers have been sent emails ...
itsecurityguru.webp 2018-06-21 12:53:03 British spies hacked computers in Syria to shut down an Islamic State online terror manual that gloated about the Manchester bombing (lien direct) British spies and soldiers have hacked into computers in Syria to shut down an Islamic State online terror manual that gloated about the Manchester bombing. Cyber experts in the UK managed to erase the pages as they were being created 3,000 miles away. The mission came amid fears the Rumiyah publication was being used to inspire terrorists to carry out ...
itsecurityguru.webp 2018-06-19 16:12:03 Ensono Announces Partnership with Alert Logic for Threat Detection and Response on AWS (lien direct) Ensono™, a leading hybrid IT services provider, partnered with Alert Logic, a leading provider of Security-as-a-Service solutions, to deliver continuous monitoring, threat detection and response for Ensono's managed Amazon Web Services (AWS) clients. Ensono will leverage Alert Logic's managed security service offering built on Alert Logic Cloud Defender suite to deliver increased security and compliance ... Guideline
itsecurityguru.webp 2018-06-19 11:35:03 MPs share concern over cyber threat to critical national infrastructure (lien direct) New insight from global cyber security and risk mitigation expert, NCC Group, has revealed that two thirds of MPs consider the compromise of critical national infrastructure to be the biggest cyber security threat facing the UK.   A year on from the cyber attack on parliamentary emails, a YouGov survey commissioned by NCC Group has gauged ...
itsecurityguru.webp 2018-06-19 11:33:05 Olympic Destroyer is back, targeting chemical, biological and nuclear threat protection entities in Europe (lien direct) Kaspersky Lab researchers tracking the Olympic Destroyer threat that famously struck the opening of the Winter Olympic Games in Pyeongchang with a destructive network worm have discovered that the hacking group behind it is still active. It appears to be targeting Germany, France, Switzerland, the Netherlands, Ukraine and Russia, with a focus on organisations involved ...
itsecurityguru.webp 2018-06-19 11:30:04 (Déjà vu) CISO Chat – Allan Alford, CISO at Forcepoint (lien direct) Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of ...
itsecurityguru.webp 2018-06-19 10:43:04 Phishing Campaigns Target Sports Fans, Consumers (lien direct) Two phishing campaigns have been targeting consumers of both the FIFA World Cup and one of its longtime partners, Adidas. One campaign attempts to lure victims into clicking on a malicious link under the guise of downloading a World Cup schedule of fixtures and a result tracker, while the second promises a “free” $50-per-month subscription for ...
itsecurityguru.webp 2018-06-19 10:42:03 Attorney-General\'s Department caught up in PageUp breach (lien direct) The Australian Attorney-General’s Department (AGD) has confirmed that some of its staff may have had their information compromised at the hands of HR software provider PageUp, after the company earlier this week admitted some data held on its clients may be at risk. As first reported by SBS News, AGD’s recruitment team sent an email to job ...
itsecurityguru.webp 2018-06-19 10:41:05 Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug (lien direct) Security researcher Marcus Brinkmann has turned up another vulnerability in the GnuPG cryptographic library, this time specific to the Simple Password Store. Brinkmann explained that CVE-2018-12356 offers both access to passwords and possible remote code execution. This bug is an incomplete regex in GnuPG’s signature verification routine, meaning an attacker can spoof file signatures on configuration files ...
itsecurityguru.webp 2018-06-19 10:39:03 Not so private eye: Got an Axis network cam? You\'ll need to patch it, unless you like hackers (lien direct) Researchers have detailed a string of vulnerabilities that, when exploited in combination, would allow for hundreds of models of internet-linked surveillance cameras to be remotely hijacked. Security biz VDOO said today it privately alerted cam-maker Axis Communications to the seven bugs it found in its gizmos, leading to the manufacturer issuing firmware updates for roughly 400 models ... Guideline ★★
itsecurityguru.webp 2018-06-19 10:38:04 This sneaky Windows malware delivers adware – and takes screenshots of your desktop (lien direct) A newly uncovered form of stealthy and persistent malware is distributing adware to victims across the world while also allowing attackers to take screenshots of infected machines’ desktops. Discovered by researchers at Bitdefender, the malware has been named Zacinlo after the name of the final payload that’s delivered by the campaign which first appeared in 2012. ... ★★★★★
itsecurityguru.webp 2018-06-19 10:38:00 (Déjà vu) 75% of Malware Uploaded on “No-Distribute” Scanners Is Unknown to Researchers (lien direct) Three-quarters of malware samples uploaded to “no-distribute scanners” are never shared on “multiscanners” like VirusTotal, and hence, they remain unknown to security firms and researchers for longer periods of time. Although some antivirus products will eventually detect this malware at runtime or at one point or another later in time, this leaves a gap in ...
itsecurityguru.webp 2018-06-19 10:37:02 Fraudster admits she was OPM dealer: Leaked US govt staff files used to bag cash, car loans (lien direct) A woman has fessed up to using people’s personal information, leaked online from the US government’s Office of Personnel Management mega-hack, to take out loans and open bank accounts. Karvia Cross, 39, of Bowie, Maryland, USA, pleaded guilty on Monday in the eastern district of Virginia to one count of identity theft and conspiracy to commit bank ... Guideline
itsecurityguru.webp 2018-06-19 10:35:01 Cyber Security: New scheme aims to bring more women into the industry (lien direct) The chronic shortage of women in the cyber security is starting to being addressed with a new training scheme devised by Protection Group International (PGI), supported by Hawker Chase, a specialist cyber recruitment consultant. The cyber gap, the difference between the demand for cyber security professionals and their supply, is projected to reach 1.8million by 2022, ...
itsecurityguru.webp 2018-06-18 11:02:02 Apple fixed firmware vulnerability found by Positive Technologies (lien direct) The vulnerability allowed exploiting a critical flaw in Intel Management Engine and still can be present in equipment of vendors that use Intel processors Apple released an update for macOS High Sierra 10.13.4, which fixes the firmware vulnerability CVE-2018-4251 found by Positive Technologies experts Maxim Goryachy and Mark Ermolov. For more details, see Apple Support. ...
itsecurityguru.webp 2018-06-18 10:58:03 How can real-time payments be secured? (lien direct) David Worthington, VP, Payments at Rambus In today's on-demand world, we expect to be able to spend, move and receive money instantly. For this reason, real-time payments (RTP), also known as 'faster payments' or 'instant payments', are gaining momentum globally. Accenture estimates that there are now 35 countries with real-time payment schemes in operation or ... ★★★★
itsecurityguru.webp 2018-06-18 10:56:03 Back to basics: Ten Tips for Outsmarting Ransomware (lien direct) By Steve Mulhearn, Director of Enhanced Technologies, Fortinet Just one year ago, the WannaCry ransomware attack made global headlines when it hit 230,000 computers, creating total chaos. A number of high-profile organisations have continued to be targeted by this ransomware, some quite recently. Just a few weeks ago, the Atlanta police department fell victim to a ... Wannacry
itsecurityguru.webp 2018-06-18 10:45:03 Boffins offer to make speculative execution great again with Spectre-Meltdown CPU fix (lien direct) A group of computer science researchers has proposed a way to overcome the security risk posed by speculative execution, the data processing technique behind the Spectre and Meltdown vulnerabilities. In a paper distributed this week through the ArXiv preprint server, “SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation,” computer scientists from University of California, Riverside, ...
Last update at: 2024-07-21 09:08:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter