What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-01-16 20:41:01 Report: Iranian APT Actors Regroup After Main Security Forum Shuts Down (lien direct)

Iranian state-sponsored hackers are regrouping after the shutdown last year of their main security forum, migrating to other forums and making new connections for potential cyber-response against mounting political pressures from the United States and Europe, according to a new report.

The post Report: Iranian APT Actors Regroup After Main...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/592439062/0/thesecurityledger -->»

Blog.png 2019-01-16 01:32:03 Podcast Episode 129: Repair Eye on the CES Guy and Sensor Insecurity (lien direct)

In this week\'s podcast: For all the great new gadgets unveiled in Las Vegas, how many can be repaired? Kyle Wiens of iFixit joins us to report from the CES show. Also: more and more our physical surroundings are populated by small, wireless sensors. How secure are they from hacking and manipulation? Not very says our second guest, Roi Mit of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/592283864/0/thesecurityledger -->»

Blog.png 2019-01-11 16:14:02 That Other Moscow: Sketchy LinkedIn Job Posts Mix US, Russian Locales (lien direct)

Bogus LinkedIn job postings for leading US organizations, including the US Army, the State of Florida and defense contractor General Dynamics, are popping up for Russian locales like St. Petersburg and Moscow, the firm Evolver has found. Is it AI-Gone-Wild, or is something more nefarious afoot?  Moscow, on the border between Idaho and Washington...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591659398/0/thesecurityledger -->»

Blog.png 2019-01-08 13:54:04 Podcast Episode 128: Do Security and Privacy have a Booth at CES? (lien direct)

In this episode of The Security Ledger podcast (#128): you\'re going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world\'s largest electronics event? We sit down with IoT luminary and...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591108026/0/thesecurityledger -->»

Blog.png 2019-01-08 13:54:04 Podcast Episode 128: CES is cool but is it secure? (lien direct)

In this episode of The Security Ledger podcast (#128): you\'re going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world\'s largest electronics event? We sit down with IoT luminary and...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591108026/0/thesecurityledger -->»

Blog.png 2019-01-07 17:47:00 More Questions as Expert Recreates Chinese Super Micro Hardware Hack (lien direct)

Though the companies named in a blockbuster Bloomberg story have denied that China hacked into Supermicro hardware that shipped to Amazon, Apple and nearly 30 other firms, a recent demonstration at hacking conference in Germany proves the plausibility of the alleged hack.  

The post More Questions as Expert Recreates Chinese Super Micro Hardware...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/590964640/0/thesecurityledger -->»

Blog.png 2019-01-04 03:09:00 Sensor-y Overload: Cyber Risk and the Merrimack Valley Gas Explosions (lien direct)

Let\'s be clear: the natural gas explosions that rocked the Merrimack Valley north of Boston in September weren\'t the result of a cyber attack. Unfortunately: well known vulnerabilities affecting the security of remote sensors and industrial control system software mean they easily could have been. 

The post Sensor-y Overload: Cyber Risk and the...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/590454606/0/thesecurityledger -->»

Blog.png 2019-01-02 14:47:05 Abine says Blur Password Manager User Information Exposed (lien direct)

Customers who use the Blur secure password manager by Abine may have had sensitive information leaked, according to a statement by Abine, the company that makes the product. 

The post Abine says Blur Password Manager User Information Exposed appeared first on The Security Ledger.

-->
Blog.png 2018-12-31 14:08:02 Podcast Episode 127: Donnie, Talk to China and Other Lessons from 2018 (lien direct)

In this week\'s podcast: as 2018 winds down, we invited David Aitel, the Chief Security Technical Officer at Cyxtera Technologies, to talk about the biggest stories of the year, including the supply chain attack on Super Micro, China\'s continued attacks on western firms, U.S. indictments of Russian and Chinese hackers and what 2019 may have in...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/589920892/0/thesecurityledger -->»

Blog.png 2018-12-25 22:57:04 Die Hard is a Movie About Building Automation Insecurity. Discuss. (lien direct)

In this episode of the Security Ledger Podcast (#126): Die Hard has finally been embraced as the bloody, violent, feel-good Christmas movie its always been. But the film, which turns 30 this year, is about more than the power of ordinary guys to stand up to evil. Did you know it\'s also a (very) early warning about the dire insecurity of building...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/589211526/0/thesecurityledger -->»

Blog.png 2018-12-20 21:21:05 \'Alexa, Protect My Data\': Amazon Sends Private Voice Files to Unauthorized Customer (lien direct)

Amazon accidentally sent 1,700 private voice files to an unauthorized customer in Germany in response to a request for personal data. The data allowed a German magazine to identify and track down the person whose voice was recorded on the files, according to a published report.

The post ‘Alexa, Protect My Data’: Amazon Sends Private...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/588497706/0/thesecurityledger -->»

Blog.png 2018-12-20 13:18:04 Facebook: We Didn\'t Give Anyone Data Without User Permission (lien direct)

Facebook\'s terrible, horrible, no good, very bad year continued, with the social media company on the defense yet again over partnerships that granted high-tech companies extensive access to user data. 

The post Facebook: We Didn’t Give Anyone Data Without User Permission appeared first on The Security Ledger.

-->
Blog.png 2018-12-19 23:47:01 Spotlight: as Attacks Mount, how to secure the Industrial Internet (lien direct)

In this spotlight edition* of The Security Ledger Podcast, Steve Hanna of Infineon joins us to talk about the growing risk of cyber attacks on industrial systems and critical infrastructure. "Industry 4.0" is poised to transform the global economy, Hanna said, but not if the issue of cyber risk can\'t be managed. We talk about how that might be...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/588302750/0/thesecurityledger -->»

Blog.png 2018-12-18 22:30:00 Podcast Episode 125: Long After The Election Kremlin\'s Computational Propaganda Campaign Rolls On (lien direct)

Priscilla Moriuchi of Recorded Future joins us once again in the Security Ledger studios to talk about the findings of two major reports released this week on Russia\'s online campaigns and how disinformation operations by foreign governments may be the "new normal." 

The post Podcast Episode 125: Long After The Election Kremlin’s...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/588120752/0/thesecurityledger -->»

Blog.png 2018-12-13 21:56:03 Destructive Shamoon Malware Attacks Italian Oil Services Firm (lien direct)

The data-wiping Shamoon malware resurfaced this week at Italian oil and gas contractor Saipem, where it destroyed files on about 10 percent of company PCs, according to a published report. The attacks may be linked to Saipem\'s work with Saudi Aramco, a target of earlier Shamoon attacks.

The post Destructive Shamoon Malware Attacks Italian Oil...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/585881192/0/thesecurityledger -->»

Blog.png 2018-12-12 12:55:05 Criminals, Not State Actors, Target Russian Oil Company in 3-Year Cyber Attack (lien direct)

Security researchers have uncovered a three-year cyber attack on a Russian oil company that appeared at first glance to be state-sponsored, but later was found to be the work of cyber criminals seeking financial gain. The discovery is a cautionary tale for security experts not to be too rash when  when drawing conclusions about high-profile cyber...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/585125518/0/thesecurityledger -->»

Blog.png 2018-12-11 21:28:05 Episode 124: The Twitter Accounts Pushing French Protests. Also: social engineering the Software Supply Chain (lien direct)

In this week\'s podcast (#124):  we speak with French security researcher Baptiste Robert about research on the social media accounts pushing the french "Yellow Vest" protests. Surprise, surprise: they\'re not french. Also: Brian Fox of the firm Sonatype joins us to talk about the recent compromise of the Github event-stream project and why...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/584966896/0/thesecurityledger -->»

Blog.png 2018-12-11 13:23:00 Is 2019 Privacy Rights\' Break Out Year? (lien direct)

Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU\'s GDPR takes root and legislation in other nations follow suit. But not everyone is on board with the new privacy regime. Who will be the privacy leaders and laggards in the New Year?

The post Is 2019 Privacy Rights’ Break Out Year? appeared first on ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/584894952/0/thesecurityledger -->»

Blog.png 2018-12-06 20:31:03 Days After Massive Breach, Marriott Customers Await Details (lien direct)

Nearly a week after Marriott disclosed a massive breach of its Starwood reservation system, customers complain that the company has not communicated with them to tell them whether they are affected. Marriott says it is sending “rolling” emails to hundreds of millions of victims. An estimated 500 million Marriott International customers...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/584089704/0/thesecurityledger -->»

Blog.png 2018-12-06 14:10:01 The Next Fraud Domain: Search Results (lien direct)

Your search results are the next frontier for online scammers and fraud, including identity theft, warns Angel Grant of RSA\'s Fraud & Risk Intelligence group.* 

The post The Next Fraud Domain: Search Results appeared first on The Security Ledger.

-->
Blog.png 2018-12-05 21:38:00 Researchers: GDPR Already Having Positive Effect on Cybersecurity in EU (lien direct)

The General Data Privacy Regulation (GDPR) seems to already be having a positive effect on the state of cybersecurity in Europe less than seven months after it was enacted, showing that policy indeed can have a direct effect on organizations\' security practices, security researchers said.

The post Researchers: GDPR Already Having Positive Effect...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/583906882/0/thesecurityledger -->»

Blog.png 2018-12-04 21:04:02 Podcast Episode 123: HaveIBeenPwned\'s Troy Hunt on Marriott\'s Big Mess and GreatHorn on the Asymmetric Threat of Email (lien direct)

Thanks to our friends at GreatHorn for sponsoring this week\'s podcast. In this episode of the Podcast, # 123: Troy Hunt, the founder of HaveIBeenPwned.com joins us to talk about Marriott International\'s big mess: a breach of Starwood Hotels\' reservation system that revealed information on half a billion (with a "B") guests. And, in our second...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/583720434/0/thesecurityledger -->»

Blog.png 2018-12-02 16:44:04 Massive Marriott Breach Underscores Risk of overlooking Data Liability (lien direct)

The Marriott breach underscores how companies fail to price in the risk of poor data security. In the age of GDPR, that could be an expensive failure. 

The post Massive Marriott Breach Underscores Risk of overlooking Data Liability appeared first on The Security Ledger.

-->
Blog.png 2018-11-30 14:07:00 Data Breach Exposes Records of 114 Million U.S. Citizens, Companies (lien direct)

A massive database holding more than 114 million records of U.S. citizens and companies was discovered sitting online unprotected due to misconfigured search, a data leak that is estimated to affect about 83 million people.

The post Data Breach Exposes Records of 114 Million U.S. Citizens, Companies appeared first on The Security Ledger.

-->
Blog.png 2018-11-29 03:28:04 Spotlight: Operationalizing Deep Web and Dark Web Intelligence (lien direct)

In this episode of the podcast: Chris Camacho of Flashpoint joins us to talk about "the deep web" and "the dark web." Chris and I talk about how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs.

The post ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582788712/0/thesecurityledger -->»

Blog.png 2018-11-29 02:23:03 Iranians Indicted in SamSam Ransomware Scheme (lien direct)

The federal government charged two Iranian men for orchestrating a nearly three-year-long international hacking and extortion scheme that deployed ransomware which to date has caused more than $30 million in losses to its victims, which include hospitals, municipalities and public institutions. A federal grand jury in New Jersey has indicted...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582781044/0/thesecurityledger -->»

Blog.png 2018-11-27 04:14:01 Podcast Episode 122: will 5G increase Internet of Things Risk? (lien direct)

Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. But what new kinds of Internet of Things use cases may become possible? And, just as important, what are the security implications of massively distributed IoT endpoints connected to capacious 5G cellular infrastructure?...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/582389450/0/thesecurityledger -->»

Blog.png 2018-11-20 18:55:05 Podcast Episode 121: DMCA Exemptions Set Stage for Right to Repair Fight and DHS Cyber Makeover (lien direct)

In this episode of the Security Ledger podcast (#121): the Librarian of Congress gave a big boost to right to repair advocates in late October when she granted exemptions provisions of the Digital Millennium Copyright Act covering repair of most electronic devices. We talk to US PIRG’s Right to Repair campaign coordinator Nathan Proctor...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/581334024/0/thesecurityledger -->»

Blog.png 2018-11-15 15:17:00 Report: Small, Stealthy Groups Behind Worst Cybercrimes (lien direct)

A small group of cybercriminals are responsible for the most damaging cyberattacks--often with the help of state sponsorship. Still, low-level criminal activity on the dark web still poses the most widespread and immediate security threat, with cryptocurrency mining, ransomware and malware all on the rise, a recent report has found.

The post ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/580412548/0/thesecurityledger -->»

Blog.png 2018-11-14 22:33:02 Survey: Attacks Find Insecure IoT Devices (lien direct)

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. 

The post Survey: Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

-->
Blog.png 2018-11-14 22:33:02 Survey Finds Attacks Find Insecure IoT Devices (lien direct)

A survey finds vast differences in security practices linked to IoT devices in the enterprise, with attacks concentrating on insecure IoT endpoints. 

The post Survey Finds Attacks Find Insecure IoT Devices appeared first on The Security Ledger.

-->
Blog.png 2018-11-13 23:09:04 Nigerian ISP Hijacks Google Traffic, Sends It Through Russia and China (lien direct)

A small Nigerian Internet service provider (ISP) hijacked traffic meant for Google data centers on Monday, re-routing local traffic through China and Russia and making some hosted services temporarily unavailable for users.

The post Nigerian ISP Hijacks Google Traffic, Sends It Through Russia and China appeared first on The Security Ledger.

>...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/580050898/0/thesecurityledger -->»

Blog.png 2018-11-13 01:11:03 Podcast Episode 120: They Email Ballots, Don\'t They? (lien direct)

In this week\'s episode (#120): more than 100,000 U.S. voters submitted their ballots in the last presidential election via email in 2016. Despite that: hardly any attention has been paid to the security of email and online voting systems used by 32 states.

The post Podcast Episode 120: They Email Ballots, Don’t They? appeared first on ...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/579871004/0/thesecurityledger -->»

Blog.png 2018-11-09 03:03:05 Bank Attacks Put Password Insecurity Back in the Spotlight (lien direct)

Two separate attacks on banks in the United States and Pakistan revealed this week highlight once again the inherent weakness of a security practice that relies on passwords or knowledge-based credentials to protect critical information. International bank HSBC said it was a victim of a credential-stuffing and became aware of unauthorized access...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/579231642/0/thesecurityledger -->»

Blog.png 2018-11-06 20:49:03 Feds, Facebook Join Forces to Prevent Mid-Term Election Fraud (lien direct)

The U.S. government and social media firms took action to suspend bogus accounts ahead of Tuesday’s midterm elections. (Photo by Paul Roberts) Federal authorities, social media companies, and the U.S. military are on cybersecurity high alert for fraud, suspicious online activity or other security glitches that could cast a shadow on...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578748236/0/thesecurityledger -->»

Blog.png 2018-11-06 20:32:02 Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails (lien direct)

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Also: we speak with Senthil Ramakrishnan, a lead member of AT&T\'s IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices....

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578746320/0/thesecurityledger -->»

Blog.png 2018-11-04 15:08:01 Managed Threat Hunting Bridges the Talent Gap (lien direct)

Skilled operators make all the difference in incident response and threat hunting. With talent scarce (and expensive), however, managed threat hunting teams may be worth a look, writes Scott Taschler of the firm Crowdstrike. As we discussed in “Uncovering the Unknown Unknowns,” threat hunting is a critical discipline that more organizations...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578376292/0/thesecurityledger -->»

Blog.png 2018-11-02 10:30:01 Report: China Eyes IoT as Next Front of Cyber War on U.S. (lien direct)

China is eyeing dominance of the Internet of Things (IoT) market and may use vulnerabilities in these technologies as the next front on its ongoing cyberwar with the United States, according to a new report.

The post Report: China Eyes IoT as Next Front of Cyber War on U.S. appeared first on The Security Ledger.

-->
Blog.png 2018-10-31 16:00:00 Sextortionist Campaigns Get Personal, Creative to Force Payouts (lien direct)

Two security firms warn of a flurry of "sextortion" campaigns recently that use new, creative and sometimes extreme methods that leverage personal information, sex-related activity and even death threats to spur victims to pay thousands in ransom fees to hackers.

The post Sextortionist Campaigns Get Personal, Creative to Force Payouts appeared...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/577729856/0/thesecurityledger -->»

Blog.png 2018-10-30 02:21:05 Podcast Episode 118: White Hat Eye on the Gaming Guy (lien direct)

In this week\'s episode, #118: modern computer games are like mini economies and that makes them a big target for hackers. We talk with four leading researchers from Bug Crowd about how even popular games fall down on security. Also: Srinivas Mukkamala, the CEO of RiskSense about how artificial intelligence and risk based approaches to securing...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/577384752/0/thesecurityledger -->»

Blog.png 2018-10-25 14:21:02 Research: Russian Disinformation Campaigns Target African Americans (lien direct)

Russian misinformation campaigns have been targeting African Americans in a number of ways to create division between left and right political agendas, create racial division and discord, and even suppress Black voter turnout, new research has found. Two recent reports outline how Russian information operations are crafting stereotypical online...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576649814/0/thesecurityledger -->»

Blog.png 2018-10-24 14:22:02 Report: Obvious Security Flaws Make ICS Networks Easy Targets (lien direct)

Industrial control systems (ICSs) remain easy targets for nation-states actors because of security gaps such as plain-text passwords, direct Internet connections and weak anti-virus protections, a new report has found. The warnings about industrial control systems running on Windows XP are becoming a thing of the past; ICS administrators seem to...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576465310/0/thesecurityledger -->»

Blog.png 2018-10-23 21:16:00 Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats (lien direct)

In this episode of the podcast (#117), we go deep on one of the hottest sectors around: cyber insurance. In the first segment, we talk with Thomas Harvey of the firm RMS about the problem of “silent cyber” risk to insurers and how better modeling of cyber incidents is helping to address that threat. In part II, we invite Chip Block of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/576345298/0/thesecurityledger -->»

Blog.png 2018-10-18 19:09:02 Spotlight Podcast: At 15 Cybersecurity Awareness Month Grows with Cyber Risk (lien direct)

In this Spotlight Podcast, sponsored by RSA: October is Cybersecurity Awareness Month. But what does that mean in an era when concerns about cybersecurity permeate every facet of our personal and professional lives? Russ Schrader of the National Cybersecurity Alliance (NCSA) and Angel Grant of RSA join us to discuss the history of Cybersecurity...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/575422200/0/thesecurityledger -->»

Blog.png 2018-10-15 21:33:05 Podcast Episode 116: Cryptojacking and MikroTik\'s Bad-Feeling Feel Good Patch Story (lien direct)

MikroTik is part of a bigger problem: the failure of infrastructure owners to take appropriate action to address serious security holes in products.

The post Podcast Episode 116: Cryptojacking and MikroTik’s Bad-Feeling Feel Good Patch Story appeared first on The Security Ledger.

-->
Blog.png 2018-10-09 17:00:05 Podcast Episode 115: Joe Grand on Unicorn Spotting and Bloomberg\'s Supply Chain Story (lien direct)

In this week\'s episode (#115), noted hardware enthusiast and hacker Joe Grand (aka “Kingpin”) told reporters from Bloomberg that finding an in-the-wild supply chain hack implanting malicious hardware on motherboards was akin to witnessing “a unicorn jumping over a rainbow.” They went with their story about just such an...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/573788130/0/thesecurityledger -->»

Blog.png 2018-10-05 00:36:03 Apple, Amazon Throw Shade on Supply Chain Hack Story (lien direct)

A report by Bloomberg alleging a massive operation by China’s Peoples Liberation Army (PLA) to plant spy hardware on servers used by some of the U.S.’s most high profile corporations is being refuted by tech vendors Apple as well as Amazon, who contend that no such compromises took place. The report written by Jordon Robinson and...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572886254/0/thesecurityledger -->»

Blog.png 2018-10-03 11:30:03 NotPetya Horror Story Highlights Need for Holistic Security (lien direct)

The NotPetya malware’s ability to cripple even sophisticated, global firms is a cautionary tale about the need for businesses to understand their risk and take a holistic view of security says Fadi Albatal, Chief Strategy Officer at Hitachi Systems Security.* If you\'re keen on information security and happen to enjoy horror stories, point...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572593864/0/thesecurityledger -->»

Blog.png 2018-10-02 17:38:04 Episode 114: Complexity at Root of Facebook Breach and LoJax is a RAT You Can\'t Kill (lien direct)

In this week\'s podcast: Facebook revealed that a breach affected 50 million accounts and as many as 90 million users. Is complexity at the root of the social media giant’s troubles? We speak with Gary McGraw of the firm Synopsys about it. Also: BIOS-based malware has been demonstrated at security conferences for years.  Last week, the...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/572474336/0/thesecurityledger -->»

Blog.png 2018-10-02 12:18:00 How Digital Transformation is forcing GRC to evolve (lien direct)

As new risks emerge, security and risk management are converging and driving the development of integrated risk management, writes David Walter, the Vice President of RSA\'s Archer division.

The post How Digital Transformation is forcing GRC to evolve appeared first on The Security Ledger.

-->
1 2 3 4 5 6 7 8

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter