What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2017-07-19 21:02:31 Petya-Bitten Subsidiary will materially impact FedEx (lien direct) In-brief: FedEx said its TNT subsidiary was still relying on manual processes more than a week after it was ravaged by the Petya wiper malware. The attack will materially impact the company’s financial performance in 2018, FedEx said in a filing with the SEC.  Federal Express (or FedEx) is the latest US firm to claim that the Petya malware...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/403744680/0/thesecurityledger -->»Related StoriesPetya Malware may be an Early Test of Muscular Trump Cyber DoctrineAfter Petya, NATO will provide Cybersecurity Help to UkrainePetya Malware is about wreaking Havoc, not collecting Ransom | The Register FedEx
Blog.webp 2017-07-19 02:13:48 Security Camera Flaw could lurk in Thousands of Devices (lien direct) In-brief: a vulnerability dubbed “Devil’s Ivy” affects hundreds of cameras by the firm Axios and – likely – thousands of other devices made by some of the world’s top technology brands. It’s another example of widespread software supply chain security risks. A serious security flaw that affects hundreds of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/402839322/0/thesecurityledger -->»Related StoriesExclusive: Flaws in common Wi-Fi Router set up Hotspot HacksMaybe ignore that South Carolina Election Hacking StoryWith an Eye on IoT Security ARM buys Simulity for $15m
Blog.webp 2017-07-18 03:35:46 Maybe ignore that South Carolina Election Hacking Story (lien direct) In-brief: a story claiming more than 100,000 hack attempts on South Carolina’s election systems raises more questions than it answers about efforts to tamper with the U.S.’s voting systems.  The Wall Street Journal and other publications ran with an ALL CAPS story today on hacking attempts targeting South Carolina’s election...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/401758174/0/thesecurityledger -->»Related StoriesAfter Petya, NATO will provide Cybersecurity Help to UkraineRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDThe Big Dark: Motive, not Means, is what holds back a Crippling Grid Hack
Blog.webp 2017-07-14 19:58:57 With an Eye on IoT Security ARM buys Simulity for $15m (lien direct) In-brief: ARM’s purchase of Simulity adds the ability to do over the air updates to embedded SIM chips and highlights ARM’s efforts to build out security and management at IoT scale.  A tiny deal this week by ARM could have a big impact on the security of the Internet of Things. The company, which makes a wide range of low power...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/397945034/0/thesecurityledger -->»Related StoriesFirm That Made Mirai-Infected Webcams Gets Security ReligionIdentity at Scale: how the Internet of Things will Revolutionize Online IdentityCash for Medical Device Clunkers? Task Force calls for Healthcare Security Overhaul
Blog.webp 2017-07-12 17:35:52 Will \'Right to Repair\' imperil IoT Security? (lien direct) In-brief: the firm Pen Test Partners notes that there are security arguments against expanding right to repair laws. But do they stand up to scrutiny?  We here at Security Ledger have covered the right to repair movement in the U.S. and abroad, where consumer advocates are looking to strengthen legal protections for customers who want to repair...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/395294340/0/thesecurityledger -->»Related StoriesAfter Petya, NATO will provide Cybersecurity Help to UkraineExclusive: Flaws in common Wi-Fi Router set up Hotspot HacksFirm That Made Mirai-Infected Webcams Gets Security Religion
Blog.webp 2017-07-11 19:42:39 After Petya, NATO will provide Cybersecurity Help to Ukraine (lien direct) In-brief: NATO said it was extending support to Ukraine to help confront a rash of cyber attacks from Russian affiliated hacking forces.  The beleaguered government of Ukraine is finally getting help with what have become chronic, disruptive cyber attacks emanating from Russia. NATO, the North Atlantic Treaty Organization, said it will be...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/394315910/0/thesecurityledger -->»Related StoriesPetya Malware may be an Early Test of Muscular Trump Cyber DoctrineRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDSecurity Firms: New Malware Built to Hobble Electric Grid
Blog.webp 2017-07-09 22:12:29 The Big Dark: Motive, not Means, is what holds back a Crippling Grid Hack (lien direct) In-brief: A crippling cyber attack that could damage and destroy equipment needed to keep the lights on in major US cities is already possible. The only thing that’s lacking is a motive to carry out such an attack, according to our guest on this week’s podcast: Joe Weiss, a Managing Partner at Applied Control Solutions, LLC and a...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/391897986/0/thesecurityledger -->»Related StoriesPetya Malware may be an Early Test of Muscular Trump Cyber DoctrineA New Great Game: Russia, China, North Korea heighten Cyber RiskPodcast: Michael Daniel on Cyber Diplomacy in the Age of Trump
Blog.webp 2017-07-07 22:07:42 Dear SEC: More Companies Warn on Financial Impact from Petya Infection (lien direct) In-brief: the Petya outbreak has prompted a string of profit and earnings warnings from major firms, with more likely in the days and weeks ahead, as companies struggle to regain their footing after the damaging wiper attack.  A week ago, writing for Digital Guardian, I noted that the outbreak of the Petya wiper malware was prompting something we...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/389661264/0/thesecurityledger -->»Related StoriesExclusive: Flaws in common Wi-Fi Router set up Hotspot HacksRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDSecurity Firms: New Malware Built to Hobble Electric Grid
Blog.webp 2017-07-06 14:00:04 Heartbleed\'s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite (lien direct) In-brief: more than three years after it was first discovered, the Heartbleed vulnerability in OpenSSL continues to plague organizations worldwide. Why has it been so hard to fix? In this Industry Perspective, Mike Pittenger of the firm Black Duck talks about some of the complicating factors that make vulnerabilities like Heartbleed so hard to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/388070812/0/thesecurityledger -->»Related StoriesState of the Endpoint: Vulnerable Software, Click-Happy UsersPetya Malware may be an Early Test of Muscular Trump Cyber DoctrineIdentity at Scale: how the Internet of Things will Revolutionize Online Identity
Blog.webp 2017-07-05 22:38:43 Podcast: Michael Daniel on Cyber Diplomacy in the Age of Trump (lien direct) In-brief: In an interview with The Security Ledger, former Obama Cybersecurity Advisor Michael Daniel weighs in on the changing US-Israel relationship, promoting cyber security talent in the U.S. and the future of the intelligence community’s ‘vulnerability equities’ program.  The arrival of the Trump Administration has raised...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/387317282/0/thesecurityledger -->»Related StoriesPetya Malware may be an Early Test of Muscular Trump Cyber DoctrineIs this Cyber War? Ransomware Attack Hits Banks, Transport, Government in UkraineAt Conference: Israel Preaches Peace through Cyber Strength
Blog.webp 2017-07-03 16:04:41 Petya Malware may be an Early Test of Muscular Trump Cyber Doctrine (lien direct) In-brief: In the hours before the Petya malware began circulating, two high level Trump Administration officials called for a tougher stand against online actors who sow chaos. The question now is how the Administration will react. Tel-Aviv, Israel– With the Petya “wiper” virus spreading globally, leaving crippled computers and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/384659310/0/thesecurityledger -->»Related StoriesIs this Cyber War? Ransomware Attack Hits Banks, Transport, Government in UkraineSecurity Firms: New Malware Built to Hobble Electric GridCash for Medical Device Clunkers? Task Force calls for Healthcare Security Overhaul
Blog.webp 2017-06-30 14:16:37 Fired Employee Hacked Smart Water Meters Just to be a Jerk (lien direct) In-brief: A man in Pennsylvania said he was just being a disgruntled former employee when he hacked into base stations owned by his ex-employer that control access to smart water meters and disrupted the business of municipal water utilities across three states. He faces jail time, probation and a fine for his actions. A Pennsylvania man who has...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/381276844/0/thesecurityledger -->»Related StoriesKaspersky: Malware Attacks on IoT More Than Double Those in 2016Podcast: The Internet of Things’ Entropy Problem and why it mattersRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIRED
Blog.webp 2017-06-28 22:25:19 Petya Malware is about wreaking Havoc, not collecting Ransom | The Register (lien direct) In-brief: On Tuesday, a ransomware infection spread across Europe and even affected companies and systems as far away as the United States and Brazil. Iain Thomson at The Register breaks down the malware used in the attack, dubbed NotPetya because it disguises itself as the Petya ransomware, although in the end it seems it was designed to wreak...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/379201736/0/thesecurityledger -->»Related StoriesWannaCry: What's in a name? Confusion | Digital GuardianIs this Cyber War? Ransomware Attack Hits Banks, Transport, Government in UkraineIdentity at Scale: how the Internet of Things will Revolutionize Online Identity NotPetya Wannacry
Blog.webp 2017-06-27 16:33:03 UPDATED: Is this Cyber War? Ransomware Attack Hits Banks, Transport, Government in Ukraine (lien direct) Fast spreading ransomware dubbed Petya has crippled parts of Ukraine and hit companies in The Netherlands, France, Russia and Spain. It appears to be spreading using a combination of software exploit and stolen passwords. -->Related StoriesOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDExclusive: Flaws in common Wi-Fi Router set up Hotspot Hacks
Blog.webp 2017-06-27 15:46:59 U.K. Parliament Attack Reshines Light on Persistent Vulnerability of Passwords (lien direct) In-brief: Password security remains a thorn in the side of security experts as once again proven by the cyberattack on U.K. Parliament, which focused on gaining access to members' e-mail accounts merely by guessing their passwords. The recent cyberattack on U.K.'s Parliament shows once again that passwords- the most basic way users have...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/377779752/0/thesecurityledger -->»Related StoriesIdentity at Scale: how the Internet of Things will Revolutionize Online IdentityA New Great Game: Russia, China, North Korea heighten Cyber RiskState of the Endpoint: Vulnerable Software, Click-Happy Users
Blog.webp 2017-06-26 22:15:30 At Conference: Israel Preaches Peace through Cyber Strength (lien direct) In-brief: Five years into a major overhaul, the Israeli government is celebrating its status as the go-to country for cyber security know-how and promoting its own recipe for success to other countries. But how many of them can or will follow suit?   Tel-Aviv, Israel — The specter of Russian hacking of the U.S. election, an epidemic of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/376867834/0/thesecurityledger -->»Related StoriesRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDSecurity Firms: New Malware Built to Hobble Electric GridReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, Infrastructure
Blog.webp 2017-06-26 21:16:53 Kaspersky: Malware Attacks on IoT More Than Double Those in 2016 (lien direct) In-brief: As of May 2017, Kaspersky Lab researchers have observed more than 7,200 different samples of malware for IoT devices in honeypot activity-more than double the number from last year–demonstrating that IoT devices are becoming increasingly vulnerable on a number of fronts, including passwords, firmware, and telnet/SSH ports. Bad...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/376807472/0/thesecurityledger -->»Related StoriesSecurity Firms: New Malware Built to Hobble Electric GridSecurity Pro tilts at Smart Drill, finds It doesn’t suckCash for Medical Device Clunkers? Task Force calls for Healthcare Security Overhaul
Blog.webp 2017-06-23 12:23:56 Podcast: The Internet of Things\' Entropy Problem and why it matters (lien direct) In-brief: Governments may worry about the democratization of strong encryption. But a bigger problem may be that the encryption we think is strong really isn’t, says Richard Moulds of the firm Whitewood. In this podcast, we talk about the.growing difficulty of generating truly random numbers in cloud environments and on the Internet of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/372530556/0/thesecurityledger -->»Related StoriesExclusive: Flaws in common Wi-Fi Router set up Hotspot HacksRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIREDIdentity at Scale: how the Internet of Things will Revolutionize Online Identity
Blog.webp 2017-06-22 14:10:46 Endpoint Protection Firm Cybereason Lands $100m Softbank Investment (lien direct) Alternatives to legacy endpoint protection software like anti virus is one of the hottest areas in the information security space. Yesterday’s announcement by Cybereason of a $100 Million investment by SoftBank only underscores that. Cybereason, which has offices in Boston, London and Tel Aviv, closed a Series D funding round from SoftBank...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/371437030/0/thesecurityledger -->»Related StoriesFinancial Malware, not Ransomware, drives most Cyber CrimeThe WannaCry Missing: Federal Systems, ConsumersThe Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business Wannacry
Blog.webp 2017-06-21 19:25:01 Chamber of Commerce Floats Guidelines for Cyber \'Credit Ratings\' (lien direct) In-brief: The U.S. Chamber of Commerce has released guidelines for the use of cyber security ratings – a kind of “credit score” that will allow consumers and other businesses to assess the trustworthiness of organizations they do business with. The U.S. Chamber of Commerce has released guidelines for the use of cyber security...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/370439134/0/thesecurityledger -->»Related StoriesA New Great Game: Russia, China, North Korea heighten Cyber RiskOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskRussia’s Cyberwar on Ukraine Is a Blueprint For What’s to Come | WIRED
Blog.webp 2017-06-21 13:37:53 Russia\'s Cyberwar on Ukraine Is a Blueprint For What\'s to Come | WIRED (lien direct) In-brief: Ukraine is a ‘test bed’ for massive and disruptive cyber attacks on critical infrastructure that might be launched against other adversaries, the U.S. included, Andy Greenberg argues in an article in Wired Magazine. Andy Greenberg over at Wired goes long on the hack of Ukraine’s electric grid in December 2015 and 2016....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/370142590/0/thesecurityledger -->»Related StoriesSecurity Firms: New Malware Built to Hobble Electric GridOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskExclusive: Flaws in common Wi-Fi Router set up Hotspot Hacks
Blog.webp 2017-06-20 21:49:33 Security Pro tilts at Smart Drill, finds It doesn\'t suck (lien direct) In-brief: Is there cause for hope? A new analysis of a connected power drill  by a researcher at DUO Security finds that it’s actually pretty secure. But challenges remain for connected device makers. It’s easy to pile on the issue of weak or laughable security in Internet of Things devices. God knows this blog has done it –...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/369343756/0/thesecurityledger -->»Related StoriesArmis scores $17m to tackle Enterprise IoT SecurityArmis scores $5m to tackle Enterprise IoT SecurityPodcast – Smart Vehicle Security: A Report from the Lab
Blog.webp 2017-06-19 14:53:35 Exclusive: Flaws in common Wi-Fi Router set up Hotspot Hacks (lien direct) In-brief: Two, serious flaws in a common wireless router made by the firm TP-Link open the door to a hacker gaining control over the device, just the latest flaw revealed in broadband and wifi routers, the firm Senrio said Monday. Two, serious flaws in a common wireless router made by the firm TP-Link open the door to hacker gaining control over...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/367811152/0/thesecurityledger -->»Related StoriesCode Blue: 8k Vulnerabilities in Software to manage Cardiac DevicesReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, InfrastructureCash for Medical Device Clunkers? Task Force calls for Healthcare Security Overhaul ★★★★
Blog.webp 2017-06-16 18:38:50 Firm That Made Mirai-Infected Webcams Gets Security Religion (lien direct) In-brief: After seeding the globe with hackable DVRs and webcams, Zhejiang Dahua Technology Co., Ltd. of Hangzhou, China will be working with the U.S. firm Synopsys to “enhance the security of its Internet of Things (IoT) devices and solutions.” The surveillance camera maker whose name became synonymous with insecure, connected...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/364325996/0/thesecurityledger -->»Related StoriesPodcast – Smart Vehicle Security: A Report from the LabCash for Medical Device Clunkers? Task Force calls for Healthcare Security OverhaulState of the Endpoint: Vulnerable Software, Click-Happy Users
Blog.webp 2017-06-15 15:00:30 Identity at Scale: how the Internet of Things will Revolutionize Online Identity (lien direct) In-brief: Far from 'breaking' the public key encryption (PKI) model, the Internet of Things is poised to turbocharge PKI adoption and revolutionize online identity, DigiCert* CTO Dan Timpson writes. If you wanted to make a movie about the Mirai botnet attacks of October 2016, you might call it “When Things Attack” or, maybe, “Revenge of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/362919156/0/thesecurityledger -->»Related StoriesOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskPersirai Botnet: 120,000 Hacked Cameras Phoning Home To IranArmis scores $17m to tackle Enterprise IoT Security
Blog.webp 2017-06-15 12:29:36 Hungry for Cyber Warriors, Military Weighs Image, Lifestyle Changes (lien direct) In brief: As cyber threats increase, the U.S. military is considering big changes to attract and retain talent, from loosening standards on grooming to shorter, mission-based deployments. Faced with mounting cyber threats and a shortage of skilled soldiers, the U.S. military needs to consider wide-ranging changes in everything from recruiting to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/362757680/0/thesecurityledger -->»Related StoriesOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskMush and Muscle: Mixed Reaction to Trump’s Executive Order on CyberObama Proposes Federal CISO, Huge InfoSec Boost
Blog.webp 2017-06-13 14:17:21 A New Great Game: Russia, China, North Korea heighten Cyber Risk (lien direct) In-brief: Russia, China and North Korea are increasingly willing to use offensive cyber operations to weaken their enemies, including the United States, according to a report by the firm Flashpoint, which released its Business Risk Index report on Tuesday. All eyes were pointed towards Washington DC last week, as the continuing drama around the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/360117432/0/thesecurityledger -->»Related StoriesFinancial Malware, not Ransomware, drives most Cyber CrimeAPT Inc.: Research Finds Ties Between Chinese Security Firm and Advanced Threat GroupFBI: Business Email Compromise is a $5 Billion Industry
Blog.webp 2017-06-12 17:25:22 Update – Security Firms: New Malware Built to Hobble Electric Grid (lien direct) In-brief: Experts from two security firms are warning that a newly discovered piece of malware dubbed Crash Override is designed to shut down and even damage electrical substations and other components of the electrical grid.  A sample of malicious software discovered at the site of a December, 2016 cyber attack on Ukraine’s electrical grid...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/358991914/0/thesecurityledger -->»Related StoriesOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskReport: UK Hospitals among Victims of Massive Ransomware AttackFinancial Malware, not Ransomware, drives most Cyber Crime
Blog.webp 2017-06-09 14:02:52 Behind Breaches: Lots of Outdated Software | Digital Guardian (lien direct) In-brief: data from the firm BitSight finds a link between outdated web browser and operating system software and headline-grabbing breaches. Are we surprised?  In the popular imagination, data breaches and other cyber incidents are the work of master hackers and cybercriminals. “It's not whether you'll be breached, but when” is common...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/354807810/0/thesecurityledger -->»Related StoriesCash for Medical Device Clunkers? Task Force calls for Healthcare Security OverhaulSurvey: Risk Management Pros Fear Internet of ThingsOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber Risk
Blog.webp 2017-06-07 16:26:53 Update: Cash for Medical Device Clunkers? Task Force calls for Healthcare Security Overhaul (lien direct) In-brief: the U.S. healthcare sector is in critical condition and needs urgent, coordinated action to protect patient safety and address vulnerabilities in millions of deployed medical devices, a Congressional Task Force has concluded. (Updated with comments from Joshua Corman of Atlantic Council. PFR June 7, 2017) The healthcare sector in the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/352223226/0/thesecurityledger -->»Related StoriesCode Blue: 8k Vulnerabilities in Software to manage Cardiac DevicesOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber RiskReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, Infrastructure
Blog.webp 2017-06-07 14:24:33 Armis scores $17m to tackle Enterprise IoT Security (lien direct) In-brief: with a $17 million investment from Sequoia Capital and Tenaya Capital, Armis becomes the latest security firm to trace its origins back to the Israel Defense Force’s Unit 8200 and the latest to target Internet of Things risk to the enterprise.  Armis, a start-up with offices in Israel and Palo Alto, said on Tuesday that it...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/352491742/0/thesecurityledger -->»Related StoriesArmis scores $5m to tackle Enterprise IoT SecurityCisco Ramps up Security for Things with IOT Threat DefenseOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber Risk
Blog.webp 2017-06-05 11:24:19 State of the Endpoint: Vulnerable Software, Click-Happy Users (lien direct) In-brief: a study of millions of mobile and desktop endpoints finds continued problems with out of date software and a willingness to fall for phishing attacks. Despite near daily reports of damaging attacks on corporate networks, many corporate employees still get by running out of date operating systems, web browsers and plug-ins, that leave...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/348248120/0/thesecurityledger -->»Related StoriesFinancial Malware, not Ransomware, drives most Cyber CrimePodcast – Smart Vehicle Security: A Report from the LabReport warns of Robot Hacks, Tampering
Blog.webp 2017-06-02 15:15:38 Financial Malware, not Ransomware, drives most Cyber Crime (lien direct) In-brief: data from the firm Symantec shows that financial malware targeting banks – not ransomware- is the most important and oft-used tool in the cyber criminal’s toolbox.  The headlines might be all about ransomware like the recent WannaCry, but data from the firm Symantec shows that financial malware targeting banks is the most...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/343903052/0/thesecurityledger -->»Related StoriesFBI: Business Email Compromise is a $5 Billion IndustryAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, Infrastructure Wannacry
Blog.webp 2017-06-01 17:19:40 Survey: Risk Management Pros Fear Internet of Things (lien direct) In-brief: Risk professionals expect a “catastrophic” security incident within the next 24 months that stems from insecure Internet of Things devices, a survey by The Ponemon Institute found.  a nearly universal belief that such devices will lead to a “catastrophic” security incident within the next 24 months, while more...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/342531572/0/thesecurityledger -->»Related StoriesTwitter Hack is latest to underscore Third Party App RiskCisco Ramps up Security for Things with IOT Threat DefenseMush and Muscle: Mixed Reaction to Trump’s Executive Order on Cyber Guideline
Blog.webp 2017-05-31 14:17:03 Podcast – Smart Vehicle Security: A Report from the Lab (lien direct) In-brief: In this Security Ledger podcast, Paul speaks with Sameer Dixit of Spirent Security Labs, a leading tester of connected (“smart”) vehicles. Truly secure, connected vehicles may be years away, he says. In the meantime, security flaws and poorly implemented features are a major issue, Dixit says, with many car companies still...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/340882558/0/thesecurityledger -->»Related StoriesReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, InfrastructureReport warns of Robot Hacks, TamperingOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber Risk Guideline ★★★★
Blog.webp 2017-05-30 15:39:40 Our Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber Risk (lien direct) In-brief: The U.S. should invest in equipment and talent to preserve legacy, analog infrastructure such as copper wire telecommunications networks and pneumatic pumps as a hedge against massively disruptive cyber attacks and other interruptions, two researchers with The MITRE Corporation argue in a recent opinion piece.  The United States should...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/339549672/0/thesecurityledger -->»Related StoriesEstonia 10 Years Later: Lessons learned from the World’s First Internet WarCode Blue: 8k Vulnerabilities in Software to manage Cardiac DevicesReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, Infrastructure
Blog.webp 2017-05-26 14:40:23 Code Blue: 8k Vulnerabilities in Software to manage Cardiac Devices (lien direct) Software used to remotely program implantable cardiac devices by a number of vendors is rife with exploitable software vulnerabilities that leave the devices vulnerable to attacks and compromise, according to a report by the firm Whitescope Inc. The analysis of hardware and software associated with implantable cardiac devices spanned four,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/334893318/0/thesecurityledger -->»Related StoriesReport: UK Hospitals among Victims of Massive Ransomware AttackReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, InfrastructureReport warns of Robot Hacks, Tampering
Blog.webp 2017-05-25 22:52:31 Report: Major Upgrade, Investments Needed to Secure Connected Vehicles, Infrastructure (lien direct) In-brief: a report by the Cloud Security Alliance calls for a bottom up remake of infrastructure to support connected vehicles and warns of more, serious attacks as connected vehicles begin interacting with each other and with connected – but insecure – infrastructure.  The ecosystem of connected vehicles is in full expansion, but car...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/333997546/0/thesecurityledger -->»Related StoriesEmboldened, Fancy Bear hacking crew targets French, German PoliticiansReport warns of Robot Hacks, TamperingFBI: Business Email Compromise is a $5 Billion Industry APT 28
Blog.webp 2017-05-23 09:00:39 Cisco Ramps up Security for Things with IOT Threat Defense (lien direct) In-brief: Networking giant Cisco Systems said on Tuesday that a new package of products and services, dubbed IoT Threat Defense. Networking giant Cisco Systems said on Tuesday that a new package of products and services, dubbed IoT Threat Defense that it says will help segregate critical systems used for medical care and in critical...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/330714696/0/thesecurityledger -->»Related StoriesReport warns of Robot Hacks, TamperingFDA: St. Judes knew about Device Flaws 2 Years Before Muddy Waters ReportThe WannaCry Missing: Federal Systems, Consumers Wannacry
Blog.webp 2017-05-19 18:55:42 The WannaCry Missing: Federal Systems, Consumers (lien direct) In-brief: One week after the WannaCry ransomware knocked out hospitals in the UK and subway fare systems in Germany, the malware is as notable for who it didn’t affect for who it did. Among those spared WannaCry’s wrath: federal IT systems in the U.S. as well as consumers. But why? The WannaCry ransomware that began spreading a week...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/326538366/0/thesecurityledger -->»Related StoriesReport: UK Hospitals among Victims of Massive Ransomware AttackWannaCry: What's in a name? Confusion | Digital GuardianFatal Flaw Slows WannaCry Ransomware Spread, but Threats Remain Wannacry
Blog.webp 2017-05-18 18:30:38 WannaCry: What\'s in a name? Confusion | Digital Guardian (lien direct) In-brief: focusing on WannaCry, the ransomware delivered in last week’s attacks, misses the point. Organizations weren’t done in by the shoddy malware, but by a class-A offensive cyber weapon known as EternalBlue. Editor’s Note: this blog is cross posted from Digital Guardian’s Data Insider blog.   We learned a long time...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/325373752/0/thesecurityledger -->»      Related StoriesFatal Flaw Slows WannaCry Ransomware Spread, but Threats RemainReport: UK Hospitals among Victims of Massive Ransomware AttackThe Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business  Wannacry
Blog.webp 2017-05-18 02:12:30 APT Inc.: Research Finds Ties Between Chinese Security Firm and Advanced Threat Group (lien direct) In-brief: The hacking group known as APT 3 appears to be a commercial outfit working on behalf of the Chinese Ministry of State Security (MSS), the firm Recorded Future reported on Wednesday. The hacking group known as APT 3 appears to be a commercial outfit working on behalf of the Chinese Ministry of State Security (MSS), the firm Recorded...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/324578408/0/thesecurityledger -->»      Related StoriesEmboldened, Fancy Bear hacking crew targets French, German PoliticiansAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsFatal Flaw Slows WannaCry Ransomware Spread, but Threats Remain  Wannacry APT 28 APT 3
Blog.webp 2017-05-16 12:52:48 Podcast: WannaCry: It\'s The Exploits, Stupid and Parsing The Cyber Executive Order (lien direct) In-brief: We speak  with Sean Dillon of the firm RiskSense, who helped reverse engineer DoublePulsar, the back door exploit tool used to help spread the WannaCry ransomware. We also chat with John Dickson of The Denim Group about the impact of President Trump’s Cyber Executive Order.  Last week was one for the record books. For the first...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/322759738/0/thesecurityledger -->»      Related StoriesFatal Flaw Slows WannaCry Ransomware Spread, but Threats RemainReport: UK Hospitals among Victims of Massive Ransomware AttackMush and Muscle: Mixed Reaction to Trump’s Executive Order on Cyber  Wannacry
Blog.webp 2017-05-15 14:23:33 Updated: Fatal Flaw Slows WannaCry Ransomware Spread, but Threats Remain (lien direct) In-brief: A fatal flaw in its design slowed the spread of WannaCry, a virulent ransomware program that has infected more than 100,000 organizations and individuals globally. A fatal flaw in its design slowed the spread of WannaCry, a virulent ransomware program that has infected more than 100,000 organizations and individuals globally. But...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/321599596/0/thesecurityledger -->»      Related StoriesReport: UK Hospitals among Victims of Massive Ransomware AttackAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsPersirai Botnet: 120,000 Hacked Cameras Phoning Home To Iran  Wannacry
Blog.webp 2017-05-12 16:56:43 Update: UK Hospitals among Victims of Massive Ransomware Attack (lien direct) In-brief: Hospitals across England were forced to divert patients from emergency departments after suffering what has been described as a cyber attack involving ransomware, according to published reports and a statement from the UK’s National Health Service. (Editor’s Note: Updated to include information on the Wana ransomware. PFR...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/318229288/0/thesecurityledger -->»      Related StoriesAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsEmboldened, Fancy Bear hacking crew targets French, German PoliticiansThe Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business  APT 28
Blog.webp 2017-05-12 13:31:09 Mush and Muscle: Mixed Reaction to Trump\'s Executive Order on Cyber (lien direct) In-brief: President Donald Trump made good on a long-held campaign promise Thursday, signing a tough-talking executive order to strengthen the cyber security of federal networks. But experts worry that the Order comes with too few specifics. President Donald Trump made good on a long-held campaign promise Thursday, signing a tough-talking...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/318039726/0/thesecurityledger -->»      Related StoriesEstonia 10 Years Later: Lessons learned from the World’s First Internet WarEmboldened, Fancy Bear hacking crew targets French, German PoliticiansPodcast: Hack, or Phreak – What Really Happened in Dallas?  APT 28
Blog.webp 2017-05-10 16:50:47 What\'s a Good Password? NIST says One that hasn\'t been stolen (lien direct) In-brief: what’s a good password? According to new guidelines from NIST: one that hasn’t already been stolen by hackers. What’s a good password? According to new guidelines from NIST: it’s one that hasn’t already been stolen by hackers. Draft guidance from NIST on the creation of digital identities (NIST SP800-63b)...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/316158838/0/thesecurityledger -->»      Related StoriesGoogle Looks Beyond Passwords To Secure Data, AssetsFBI: Business Email Compromise is a $5 Billion IndustryThe Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business 
Blog.webp 2017-05-09 19:08:05 Persirai Botnet: 120,000 Hacked Cameras Phoning Home To Iran (lien direct) In-brief: a botnet of 120,000 cameras that takes its orders from servers based in Iran uses a long-ago disclosed security vulnerability in camera software to spread. The flaw affects over 1,000 different models of cameras, Trend Micro reports.  Trend Micro reported Tuesday that its researchers have uncovered yet another malicious botnet of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/315117532/0/thesecurityledger -->»      Related StoriesAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsReport warns of Robot Hacks, TamperingPodcast: Hack, or Phreak – What Really Happened in Dallas? 
Blog.webp 2017-05-08 20:21:06 FBI: Business Email Compromise is a $5 Billion Industry (lien direct) In-brief: the FBI is warning the public to beware of business email compromise attacks, saying that they have cost U.S. businesses more than $1.6 billion in losses since 2013.  The U.S. Federal Bureau of Investigation (FBI) is warning business owners and the public about the growing threat posed by so-called “business email...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/314052424/0/thesecurityledger -->»      Related StoriesEmboldened, Fancy Bear hacking crew targets French, German PoliticiansGoogle Looks Beyond Passwords To Secure Data, AssetsAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets  APT 28
Blog.webp 2017-05-07 21:19:56 The Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business (lien direct) In-brief: in the latest Security Ledger podcast, Editor in Chief Paul Roberts speaks with Lior Div of the firm Cybereason and Brian NeSmith of the firm Arctic Wolf about the growing sophistication of ransomware attacks and platforms and how scammers are targeting small businesses and non-profits.  Ransomware was in the news again this week....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/312980818/0/thesecurityledger -->»      Related StoriesGoogle Looks Beyond Passwords To Secure Data, AssetsPodcast: Facebook Makes a Stand. But can Fake News be stopped?Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets 
Last update at: 2024-04-28 15:08:05
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter