What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2017-12-22 15:22:32 NotPetya\'s Cost to FedEx: $400 Million and counting (lien direct) As Federal Express continues to recover from the devastating NotPetya malware outbreak, the cost of the attack on the company continues to grow, topping $400 million in just the last six months.  FedEx said it is still recovering from the destructive wiper malware attack and reported a $100 million hit to its financial results in the second...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/512318212/0/thesecurityledger -->» FedEx NotPetya
Blog.webp 2017-12-22 03:19:42 University of Michigan Lands $3.6m DARPA Grant for Unhackable Hardware (lien direct) The University of Michigan announced that it has received a $3.6 million grant to develop hardware based security features that will make Internet connected systems “unhackable.” The grant will fund a project called MORPHEUS, which is developing a means of fending off hackers by turning computer circuits into the equivalent of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/512208938/0/thesecurityledger -->»
Blog.webp 2017-12-21 21:17:57 Bill calls for State-Federal Coordination on Election Cybersecurity | Cyberscoop (lien direct) This is a curated news item. Read the original article here. A bipartisan group of senators introduced legislation on Thursday to protect U.S. elections from foreign meddling through cyberattacks. The Secure Elections Act, would facilitate communication among the federal, state and local levels of government on cyberthreats to elections and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/512202696/0/thesecurityledger -->»
Blog.webp 2017-12-20 16:11:21 European police take down criminals behind ransomware strains | Cyberscoop (lien direct) This is a curated news item. Read the original article here. The folks over at Cyberscoop are reporting that Romanian police announced the arrest of three suspects and the questioning of six more in an operation against a cybercrime gang that spread two of the most popular ransomware variants in the world on Wednesday. The arrests were carried out...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511875786/0/thesecurityledger -->»
Blog.webp 2017-12-20 16:07:48 Third Party Leak Exposes Info on 123 Million US Households (lien direct) A massive and potentially damaging data leak has exposed sensitive and detailed consumer profiles on nearly every American household, the security firm UpGuard Security said on Tuesday.  Detailed consumer profiles on 123 million American households compiled by the firm Alteryx was discovered on a weakly secured cloud server hosted by Amazon. The...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511820052/0/thesecurityledger -->»
Blog.webp 2017-12-20 14:00:25 Windows 10 Facial Recognition fooled by Photos | Security Affairs (lien direct) This is a curated news item. Read the original article here. A facial recognition feature built into Microsoft’s Windows 10 operating system can be fooled using just a photograph of the authorized user, Security Affairs reports. Researchers at the German security firm Syss published their findings online, saying that an insecure...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511886028/0/thesecurityledger -->» ★★
Blog.webp 2017-12-20 03:22:05 US says North Korea behind WannaCry Attack (lien direct) The Trump Administration on Tuesday said that the government of North Korea was responsible for the cyber attack dubbed “WannaCry” that infected hospitals in the United Kingdom and hundreds of thousands of other computers globally.  In an address at the White House, Tom Bossert, Assistant to the President for Homeland Security and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511714342/0/thesecurityledger -->» Wannacry
Blog.webp 2017-12-19 10:13:42 Kaspersky files Lawsuit over DHS Ban claims Innocence (lien direct) This is a curated news item. Read the original article here. A week after President Donald Trump signed legislation banning the use of software from the firm Kaspersky Lab by the U.S. Government, the Moscow-based firm has filed a legal appeal in the U.S. District Court for the District of Columbia challenging the new legislation.  At issue is...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511894058/0/thesecurityledger -->»
Blog.webp 2017-12-18 20:35:43 Podcast: New Malware targets Industrial Safety Systems and Uncle Sam Bans Kaspersky – What Now? (lien direct) In our latest podcast: industrial security expert Joe Weiss talks to us about Triton, a new malware family targeting industrial safety systems. Also: Dave Aitel of the firm Immunity Inc. joins us again to talk about new legislation banning government agencies from using anti malware software by Kaspersky Lab. And, Alan Neuman of the firm Contrast...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/511405188/0/thesecurityledger -->»
Blog.webp 2017-12-15 17:38:11 Report: Nation-Backed Hackers Hit Industrial Emergency Shutdown System (lien direct) Hackers believed to be affiliated with a nation-state hacked into emergency shutdown systems at a facility in the Middle East. The attack seemed intended to “cause a high-impact attack with physical consequences,” according to reports from a number of cyber security firms. In blog posts on Thursday, FireEye and Dragos Security both...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/510778964/0/thesecurityledger -->»
Blog.webp 2017-12-13 21:12:54 Mirai Botnet Authors Plead Guilty | Krebsonsecurity (lien direct) Three men have pleaded guilty in U.S. federal court for their role creating and renting out the Mirai botnet, which launched damaging denial of service attacks against the U.S. firm Dyn and other online properties, the website Krebs on Security reports.  Josiah White, Paras Jha and Dalton Norman entered guilty pleas in US District Court for the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/510274374/0/thesecurityledger -->» Guideline
Blog.webp 2017-12-12 15:31:05 Podcast: will Uber\'s Florida Man Problem chill Bug Bounties? (lien direct) In our latest podcast: the ride sharing firm Uber finds itself on the wrong side of a Florida Man story after paying $100,000 in hush money to a man from The Sunshine State who stole information on 57 million Uber customers. We speak with Katie Moussouris about how the company’s actions could affect the future of the young vulnerability...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/509894038/0/thesecurityledger -->» Uber
Blog.webp 2017-12-11 18:34:41 Microsoft working on secure processor for Internet of Things | Wired (lien direct) Microsoft is developing a secure processor for The Internet of Things under the banner of Project Sopris, Wired reports. The Project Sopris microcontroller is in the prototype stage and essentially incorporates features that Microsoft has identified as necessary for secure devices. Among them, features for conducting regular software updates and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/509371136/0/thesecurityledger -->»
Blog.webp 2017-12-11 17:08:26 Researchers use radio to jump air gapped industrial control systems (lien direct) Researchers at CyberX say they have found a way to sneak sensitive data off of industrial control system networks using radio frequency communications. The attack could be used to compromise so-called “air gapped” networks that are not connected to the Internet. The researchers presented their work at the Black Hat Europe conference in...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/509331064/0/thesecurityledger -->»
Blog.webp 2017-12-08 17:07:55 US Firms May Be Early GDPR Targets (lien direct) Large US firms may be among the first targets of EU regulators once the General Data Protection Rule goes into effect. (Editor’s Note: this blog post first appeared on Digital Guardian’s Digital Insider blog. You can read the full post here. ) U.S. firms that think they're immune to the requirements of the EU's new General Data...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/507588860/0/thesecurityledger -->»
Blog.webp 2017-12-05 22:20:08 Spy Eyes In the Sky: DHS says DJI Drones spy for Chinese Government, Industry (lien direct) The Department of Homeland Security is warning that commercial drones made by the China-based firm Da Jian Innovations (DJI) may be providing “U.S. critical infrastructure and law enforcement data” to the Chinese government and favored industries in that country, according to a copy of an August, 2017 Intelligence Bulletin (PDF)...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/505802702/0/thesecurityledger -->»
Blog.webp 2017-12-04 20:51:59 Podcast: Infosec has a #MeToo Problem also TOR-ifying Wikipedia (lien direct) In this week’s Security Ledger Podcast, we talk with Genevieve Southwick, CEO of the B-Sides Las Vegas hacker conference about the information security industry’s #metoo problem and what steps conference organizers are taking to stem sexual assault and harassment at information security events. Also: researcher Alec Muffet talks with...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/505027616/0/thesecurityledger -->»
Blog.webp 2017-12-02 17:53:16 Congress told Breaches, Sharing Spell End of Authentication by What We Know (lien direct) The days of logging into a web site or application with nothing more than facts stored in your brain are nearing their end, pushed to extinction by the unrelenting pace of information sharing online and an equally unrelenting storm of data breaches that expose that data. The theft and re-use of data stolen from e-commerce and social media firms...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/503601364/0/thesecurityledger -->»
Blog.webp 2017-11-29 15:13:11 Podcast: Uber Breach Puts Focus on Securing DevOps Secrets (lien direct) The hack of Uber and the loss of information on 57 million customers is just the latest security incident stemming from what our guest Elizabeth Lawler calls “DevOps secrets” – valuable credentials, APIs and other sensitive information that often end up exposed to the public as a result of lax continuous development operations....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/502274886/0/thesecurityledger -->» Uber
Blog.webp 2017-11-27 22:48:01 Surveillance Under The Tree: Connected Device Audit Turns up Sensors, Security Holes (lien direct) Sensors and security holes are common companions on a range of connected toys and consumer devices available to consumers this holiday season.  Germany’s telecommunications regulator made headlines last week by ordering citizens who had purchased smart watches for their children to have the devices destroyed. The devices, equipped with...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/500529502/0/thesecurityledger -->»
Blog.webp 2017-11-26 22:34:29 Podcast: Why Germany wants Smart Watches destroyed and One Nation Under Trolls (lien direct) In this week’s Security Ledger podcast, sponsored by our friends at CyberArk, we talk about the German government’s recent decision to declare kids smart watches “surveillance devices” and to order their destruction. Also: Adrian Shabaz of Freedom House comes in to talk to us about the latest Internet Freedom report, which...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/499890540/0/thesecurityledger -->»
Blog.webp 2017-11-22 19:44:32 Did you give love to Russian Trolls? Facebook will tell you. (lien direct) Facebook said it will release a feature that lets users see if they liked pages associated with the Internet Research Agency, a Russian troll outfit.  ‘Fall for perception distorting bait from a Russian troll? Not me!’ Or so we’d like to think. The truth is that, in the heated back and forth of the 2016 presidential election,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/497448402/0/thesecurityledger -->»
Blog.webp 2017-11-21 19:12:57 Citing Anti Surveillance Laws, German Government Orders Child Smart Watches Destroyed (lien direct) Citing that country’s strict laws against unauthorized video and audio recording, Germany’s government has banned smart watches marketed to children and ordered parents to destroy the devices, which it labeled illegal surveillance tools.  The order, addressed to manufacturers, buyers and sellers of the smart watches, is just the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/496831944/0/thesecurityledger -->»
Blog.webp 2017-11-21 14:45:02 Harvard Publishes Guide for Securing Political Campaigns (lien direct) A new guide from Harvard University’s Kennedy School of Government is offering guidance to political campaigns that wish to keep hackers at bay. The Cybersecurity Campaign Playbook (PDF) counts Robby Mook, Hillary Clinton’s Campaign Manager from the 2016 campaign, and Matt Rhoades, Mitt Romney’s 2012 Campaign Manager as...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/496701868/0/thesecurityledger -->»
Blog.webp 2017-11-19 20:44:20 North Korea\'s widening Net, pricing the Equifax Hack & Dark Markets in Turmoil (lien direct) In this week’s podcast, after a string of reports about North Korea’s growing forays onto sensitive corporate networks, we speak with Adam Meyers of CrowdStrike about the widening net of North Korean offensive hacking and how the Hermit Kingdom is playing the part both of cyber criminal and nation-state actor.  Also: we unpack the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/495673822/0/thesecurityledger -->» Cloud Equifax APT 37
Blog.webp 2017-11-16 18:58:42 China delays notification of software holes targeted in state hacks (lien direct) China is doing a better job finding and disclosing information on software security holes…except when those vulnerabilities are high risk and might be used in targeted attacks. That, according to a report out Thursday by the firm Recorded Future. Disclosure of vulnerabilities associated with malicious software used by China-affiliated...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/493790120/0/thesecurityledger -->»
Blog.webp 2017-11-15 17:21:07 US Government Warns of Hidden Cobra North Korea Cyber Threat (lien direct) A Department of Homeland Security (DHS) Alert released on Tuesday warns the public about a campaign of hacking by the government of North Korea it has code-named “Hidden Cobra.” DHS joined the FBI for a joint Technical Alert about the campaign and its use of a piece of malicious software dubbed FallChill, a remote access trojan (RAT)...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/493009316/0/thesecurityledger -->» Medical APT 38
Blog.webp 2017-11-14 05:22:27 Cisco Talos finds More Flaws in Foscam Cameras (lien direct) Cisco Systems is warning the public about a range of new vulnerabilities it has discovered in IP cameras from the firm Foscam, a popular maker of commercial and consumer surveillance cameras, the second trove of software security holes uncovered since June.  Cisco’s Talos group on Monday detailed eight vulnerabilities including remote code...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/492069176/0/thesecurityledger -->»
Blog.webp 2017-11-13 04:23:26 (Déjà vu) Securing Medical Devices, Rethinking OWASP\'s Top 10 & BlackDuck CEO Lou Shipley (lien direct) In this, our 70th episode of The Security Ledger podcast, we speak withXu Zou of the Internet of Things security startup Zingbox about the challenges of securing medical devices and clinical networks from cyber attack. Also: we take a look at the turmoil that has erupted around the OWASP Top 10, a list of common application security foibles. And...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/491405242/0/thesecurityledger -->»
Blog.webp 2017-11-13 04:13:49 Episode 70: securing medical devices, OWASP Top 10 controversy and BlackDuck CEO Lou Shipley (lien direct) In this, our 70th episode of The Security Ledger podcast, we speak withXu Zou of the Internet of Things security startup Zingbox about the challenges of securing medical devices and clinical networks from cyber attack. Also: we take a look at the turmoil that has erupted around the OWASP Top 10, a list of common application security foibles. And...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/492554472/0/thesecurityledger -->»
Blog.webp 2017-11-11 17:59:45 Exclusive: Eye on Weapons Systems, North Korean Hackers target US Defense Contractors (lien direct) North Korean hackers have stepped up their attacks on U.S. defense contractors in an apparent effort to gain intelligence on weapon systems and other assets that might be used against the country in an armed conflict with the United States and its allies, The Security Ledger has learned. Security experts and defense industry personnel interviewed...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/490572800/0/thesecurityledger -->»
Blog.webp 2017-11-10 00:18:32 Equifax says breach cost it $87m (lien direct) Data broker Equifax said that the data breach that spilled information on some 140 million individuals has cost the company $87 million so far, with more costs likely in the future. The disclosure, made as part of the company’s quarterly filing with the US Securities and Exchange Commission, is the first public disclosure of the direct costs...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/489498552/0/thesecurityledger -->» Equifax
Blog.webp 2017-11-08 22:59:22 Survey of Enterprises Finds High Anxiety over IoT (lien direct) A survey by Forrester and the firm Forescout finds business leaders in a state of high anxiety over the Internet of Things, as more connected devices infiltrate the workplace.  Business leaders are experiencing high anxiety over the connected devices on their networks, claiming that they are unable to identify all the devices in their...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/488777126/0/thesecurityledger -->» Guideline
Blog.webp 2017-11-06 23:08:46 Report details mass digital surveillance, attacks on ASEAN linked to Vietnamese APT group (lien direct) The security firm Volexity reported on Monday that it uncovered a massive campaign of digital surveillance and web-based attacks directed at ASEAN and other civil society groups in Vietnam, Cambodia and other countries, including ASEAN, the Association of Southeast Asian Nations. Volexity researchers discovered malicious code lurking on main...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/487378968/0/thesecurityledger -->»
Blog.webp 2017-11-05 16:59:02 Dark Markets do it better, surveying the Phishing underground and dissecting a Fancy Bear attack (lien direct) In episode 69 of The Security Ledger podcast, we speak with Luca Allodi of The University of Eindhoven in The Netherlands about research on the functioning of dark markets. Also: DUO Security researched the trade in phishing toolkits – you’ll be surprised at what they learned. And we deconstruct a campaign against the citizen...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/486500376/0/thesecurityledger -->» APT 28
Blog.webp 2017-11-02 21:51:07 AP: Russia hackers had targets worldwide, beyond US election (lien direct) The Associated Press is reporting on a trove of data accidentally leaked by the Russian-backed advanced persistent threat (APT) group known as Fancy Bear that suggests the group conducted a years-long campaign against targets in the US, Ukraine, Russia, Georgia and Syria.  The documents, which were discovered by the security firm Secureworks,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/484600838/0/thesecurityledger -->» APT 28
Blog.webp 2017-11-01 16:22:47 Survey finds Device Makers Security Priorities Often Misplaced (lien direct) Low-hanging Internet of Things security fruit may be left unpicked, as connected device makers fret about the predation of sophisticated hackers, but balk at simple security fixes, a Security Ledger and LogMeIn survey finds. A survey by LogMeIn and The Security Ledger found that IT professionals working at companies developing or producing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/483650484/0/thesecurityledger -->»
Blog.webp 2017-10-30 17:05:39 Industry Giants Back Arm IoT Security Framework (lien direct) British semiconductor giant Arm said it has a solution for securing billions of devices on the Internet of Things:Platform Security Architecture (PSA), a platform that it calls the first common industry framework for building secure connected devices.  British semiconductor giant Arm said it has a solution for securing billions of devices on the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/482172890/0/thesecurityledger -->»
Blog.webp 2017-10-27 21:28:25 NotPetya Infection Left Merck Short of Key HPV Vaccine (lien direct) The NotPetya malware infection shut down pharmaceutical giant Merck’s production of the pediatric vaccine GARDASIL last June, forcing the company to borrow the drug from a stockpile maintained by the U.S. Centers for Disease Control and Prevention to meet demand. The NotPetya malware infection shut down pharmaceutical giant Merck &...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/480193766/0/thesecurityledger -->» NotPetya
Blog.webp 2017-10-27 17:05:12 Hacking Back Reconsidered and the Guy who makes Mr. Robot\'s Hacking Scenes Look So Good (lien direct) In this week’s podcast, we talk with Gadi Evron of Cymmetria, which released Mazehunter, a targeted hack-back tool this week about going on offense and staying on the right side of the law. Also: Ryan Kazanciyan of Tanium is one of the talented hackers who help design Mr. Robot’s hacking scenes. We talk with him about bringing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/480044316/0/thesecurityledger -->»
Blog.webp 2017-10-25 20:55:41 Flaw in MQX Operating System Could Put Internet of Things in Crosshairs (lien direct) Flaws in software run by a range of microprocessors could be widespread in embedded systems, security experts and the Department of Homeland Security are warning. A serious security hole in software that runs millions of embedded systems could leave them open to remote hacking, the Department of Homeland Security warns. The MQX real time operating...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/478646612/0/thesecurityledger -->»
Blog.webp 2017-10-23 22:57:50 FBI and Homeland Security dish Dirt on Critical Infrastructure Attacks (lien direct) A new joint FBI-DHS report dishes the dirt on recent sophisticated attacks targeting the US energy grid and critical infrastructure, saying third party firms and web sites to gain access to energy and other critical infrastructure networks. It also names a sophisticated hacking group believed to be linked to the government of Russia.  The FBI and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/477204042/0/thesecurityledger -->»
Blog.webp 2017-10-20 15:34:46 Antivirus Software is dying. What will replace it? (lien direct) In this industry perspective, Dan Larson of the firm CrowdStrike argues that antivirus software is becoming less effective at stopping damaging cyber attacks, but that companies need to look before they leap when replacing it.  Headlines this summer were buzzing with coverage of cyber attacks and reports of organizations that fell victim to them...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/475053713/0/thesecurityledger -->»
Blog.webp 2017-10-19 17:00:48 Plumbing the KRACK Vulnerability and Fast Flux Botnets: the AirBnB of the Cybercrime World (lien direct) In this 67th episode of The Security Ledger Podcast, we talk with Bob Rudis of the firm Rapid7 about KRACK, a security hole that affects most wi-fi hotspots. Also: Or Katz of Akamai talks about that company’s work analyzing fast-flux botnets, which have become like AirBnB for cyber criminals looking for a place to host malicious networks....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/474411429/0/thesecurityledger -->»
Blog.webp 2017-10-18 16:06:01 ROCA Crypto Flaw could have big Impact on Internet of Things (lien direct) With no simple way to patch affected systems, the security vulnerability in Trusted Platform Module (TPM) chipsets made by the firm Infineon may be with us for years to come, security experts warn. At the same time as the world is sorting out the implications of a security flaw in the widely used Wi-Fi Protected Access (WPA-2) wireless technology,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/473565972/0/thesecurityledger -->»
Blog.webp 2017-10-16 18:17:52 Update: Flaw in widely used Wi-Fi Flaw could allow snooping (lien direct) Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections.  (Updated to add commentary by Bob Rudis of Rapid 7.) Researchers are warning that a flaw in WPA-2, a widely used standard for securing wireless Internet connections, could leave users and businesses open...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/472145564/0/thesecurityledger -->»
Blog.webp 2017-10-16 18:17:52 (Déjà vu) Update: Flaw in widely used Wi-Fi Standard could allow snooping (lien direct) Hundreds of millions of wireless devices may be affected by a flaw in WPA-2, a widely used standard for securing wireless Internet connections.  (Updated to add commentary by Bob Rudis of Rapid 7.) Researchers are warning that a flaw in WPA-2, a widely used standard for securing wireless Internet connections, could leave users and businesses open...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/472834202/0/thesecurityledger -->»
Blog.webp 2017-10-13 19:15:28 Research Finds Home Routers fill ranks of Fast Flux Botnets (lien direct) Research from the firm Akamai finds cyber criminals are marrying vulnerable home routers to sophisticated “fast flux” command and control tools to create long-lived, cyber criminal infrastructure. Researchers at Akamai Technologies say that vulnerable and compromised home routers make up the bulk of a 14,000 host “fast flux” botnet that is...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/469923794/0/thesecurityledger -->»
Blog.webp 2017-10-12 06:23:52 In Post Password Era, Passwords are the Problem (lien direct) The standard password has never been less effective or more susceptible to attacks. But some of the U.S.’s leading corporations say they’re also not ready to get rid of it.  Las Vegas, Nevada — Businesses knew that passwords were dead long before the theft of billions of user credentials from Yahoo! and information on more...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/468643926/0/thesecurityledger -->» Guideline Yahoo
Blog.webp 2017-10-11 14:55:47 Kaspersky\'s Cold War(e), Unpacking DOJ\'s Encryption Talk and regulating IoT (lien direct) In our latest Security Ledger Podcast we talk about Kaspersky Lab’s Cold War tinged smack down with for NSA analyst Dave Aitel of Immunity Inc. Also: Bruce Schneier weighs in on what has and hasn’t changed in the Trump DOJ’s take on strong encryption, while Josh Corman of PTC tells us that federal rules governing IoT security may...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/468161274/0/thesecurityledger -->»
Last update at: 2024-04-27 18:08:39
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter