What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2022-03-06 16:39:13 Episode 236: Cyberwar Takes A Back Seat In Ukraine (For Now) (lien direct) we sit down with Christian Sorenson, the former lead of the international cyber warfare team at US Cyber Command and CEO of cybersecurity firm, SightGain, to talk about what we've learned so far from Russia's war in Ukraine, and what may be coming next. Guideline
Blog.webp 2021-06-24 20:45:19 Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture (lien direct) Forget about Colonial Pipeline and JBS. A coordinated cyber attack on U.S. agriculture could, in short order, lead to foot shortages and hunger in the U.S. and abroad. And history has shown us that when food gets scarce, things get ugly - fast. How likely is such an attack? More likely than you might think, says Rob Wood of NCC Group, our guest on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/655486438/0/thesecurityledger -->» Guideline
Blog.webp 2020-09-10 17:30:29 PKI Points the Way for Identity and Authentication in IoT (lien direct) Modern enterprise networks are populated by both people and, increasingly, "things." But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security. The post ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/635363348/0/thesecurityledger -->» Guideline
Blog.webp 2020-02-24 12:30:00 As Cyber Attacks Mount, Small Businesses seek Authentication Fix (lien direct) Small and medium-sized businesses find themselves in the cross hairs of sophisticated hacking groups. Improved identity and access management (IAM) tools are critical to keeping hackers at bay. But what do SMBs want? A LastPass survey of IT leaders has some valuable clues. The post As Cyber Attacks Mount, Small Businesses seek Authentication...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/618965882/0/thesecurityledger -->» Guideline LastPass
Blog.webp 2019-06-17 12:28:03 Cognitive Bias is the Threat Actor you may never detect (lien direct) Cognitive bias among workers can undermine security work and lead to critical misinterpretations of data, warns Forcepoint X-Labs research scientist, Dr. Margaret Cunningham. The post Cognitive Bias is the Threat Actor you may never detect Threat Guideline
Blog.webp 2019-03-21 12:40:04 Report: with most exploited vuln of 2018, it\'s really Really REALLY time to ditch IE! (lien direct) Microsoft's products are still a leading source of exploitable security vulnerabilities used by hackers, according to a report by the firm Recorded Future. The post Report: with most exploited vuln of 2018, it’s really Really REALLY time to ditch IE! Guideline
Blog.webp 2019-01-11 16:14:02 That Other Moscow: Sketchy LinkedIn Job Posts Mix US, Russian Locales (lien direct) Bogus LinkedIn job postings for leading US organizations, including the US Army, the State of Florida and defense contractor General Dynamics, are popping up for Russian locales like St. Petersburg and Moscow, the firm Evolver has found. Is it AI-Gone-Wild, or is something more nefarious afoot?  Moscow, on the border between Idaho and Washington...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591659398/0/thesecurityledger -->» Guideline
Blog.webp 2018-12-11 13:23:00 Is 2019 Privacy Rights\' Break Out Year? (lien direct) Whatever else it may bring, 2019 will be a breakout year for online privacy, as the EU's GDPR takes root and legislation in other nations follow suit. But not everyone is on board with the new privacy regime. Who will be the privacy leaders and laggards in the New Year? The post Is 2019 Privacy Rights’ Break Out Year? Guideline
Blog.webp 2018-11-06 20:32:02 Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails (lien direct) In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Also: we speak with Senthil Ramakrishnan, a lead member of AT&T's IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/578746320/0/thesecurityledger -->» Guideline
Blog.webp 2018-10-30 02:21:05 Podcast Episode 118: White Hat Eye on the Gaming Guy (lien direct) In this week's episode, #118: modern computer games are like mini economies and that makes them a big target for hackers. We talk with four leading researchers from Bug Crowd about how even popular games fall down on security. Also: Srinivas Mukkamala, the CEO of RiskSense about how artificial intelligence and risk based approaches to securing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/577384752/0/thesecurityledger -->» Guideline
Blog.webp 2018-08-16 15:09:05 Stand up for Journalism: Our Most Important, Least Glamorous Profession (lien direct) From the Mỹ Lai Massacre, to Love Canal to clergy sex abuse to the lead in Flint’s water, our awareness of urgent problems in our communities comes not from the West Wing or government officials (themselves elites) but from nosy, dogged and mostly under-compensated reporters doing their jobs and holding the powerful to account. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/564619842/0/thesecurityledger -->» Guideline
Blog.webp 2018-07-25 12:50:05 Expert says: Hack your Smart Home to Secure It (lien direct) Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features. Not long ago, Michael Sverdlin, the back-end team leader for IoT security startup Vdoo, bought his...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560700964/0/thesecurityledger -->» Hack Guideline
Blog.webp 2018-07-04 21:23:02 Quantum Principles Eyed to Solve Current Limitations in Encryption, Data Protection (lien direct) Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology. Security researchers in the United Kingdom are among those leading the move toward quantum...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/556419674/0/thesecurityledger -->» Guideline
Blog.webp 2018-06-27 19:32:01 Mobile, automation-industry leaders promote two new IoT security efforts (lien direct) Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape. On the mobile front, a number of global operators including  AT&T, China Mobile, China Telecom, China...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554973984/0/thesecurityledger -->» Threat Guideline
Blog.webp 2018-06-21 14:19:03 Spotlight Podcast: Why North Korean Summit won\'t End Hacking Threat (lien direct) In this Spotlight Podcast, Jon Condra, the Director of Asia Pacific Research at Flashpoint talks about why U.S. President Donald Trump’s summit with North Korean leader Kim Jong Un won’t put an end to North Korea’s online predation. That is just one conclusion in Flashpoint’s semi yearly Business Risk Intelligence Report. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553660194/0/thesecurityledger -->» Guideline
Blog.webp 2018-05-24 02:34:01 FBI exaggerated inability to access encrypted devices in promotion of \'Going Dark\' problem (lien direct) The FBI has mislead Congress and the public about the extent to which encrypted cellphones are hampering federal investigations by preventing authorities from accessing the devices–presumably to support the agency’s own agenda to gain backdoor access to them. The FBI claimed that its investigators were locked out of nearly 7,800...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/547772640/0/thesecurityledger -->» Guideline
Blog.webp 2018-04-23 15:46:04 Podcast Episode 93: Talking GDPR with Cisco\'s Chief Privacy Officer and RSA 2018 Recap (lien direct) This episode of The Security Ledger Podcast (#93) was sponsored by Keysight Technologies, a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Check them out at Keysight.com. In this episode: with the May 25th go-live date of the EU General Data Privacy...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/541122716/0/thesecurityledger -->» Guideline
Blog.webp 2018-04-11 12:53:00 SirenJack bug puts emergency alert sirens at risk for hacks (lien direct) Researchers have found a vulnerability in emergency-alert systems provided by ATI Systems that could put millions at risk by allowing hackers to sound false alarms or otherwise mislead the public in regards to warning of natural and man-made disasters in the United States. Bastille, which specializes in software-defined radio enterprise threat...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/538528038/0/thesecurityledger -->» Guideline
Blog.webp 2017-12-13 21:12:54 Mirai Botnet Authors Plead Guilty | Krebsonsecurity (lien direct) Three men have pleaded guilty in U.S. federal court for their role creating and renting out the Mirai botnet, which launched damaging denial of service attacks against the U.S. firm Dyn and other online properties, the website Krebs on Security reports.  Josiah White, Paras Jha and Dalton Norman entered guilty pleas in US District Court for the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/510274374/0/thesecurityledger -->» Guideline
Blog.webp 2017-11-08 22:59:22 Survey of Enterprises Finds High Anxiety over IoT (lien direct) A survey by Forrester and the firm Forescout finds business leaders in a state of high anxiety over the Internet of Things, as more connected devices infiltrate the workplace.  Business leaders are experiencing high anxiety over the connected devices on their networks, claiming that they are unable to identify all the devices in their...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/488777126/0/thesecurityledger -->» Guideline
Blog.webp 2017-10-12 06:23:52 In Post Password Era, Passwords are the Problem (lien direct) The standard password has never been less effective or more susceptible to attacks. But some of the U.S.’s leading corporations say they’re also not ready to get rid of it.  Las Vegas, Nevada — Businesses knew that passwords were dead long before the theft of billions of user credentials from Yahoo! and information on more...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/468643926/0/thesecurityledger -->» Guideline Yahoo
Blog.webp 2017-06-01 17:19:40 Survey: Risk Management Pros Fear Internet of Things (lien direct) In-brief: Risk professionals expect a “catastrophic” security incident within the next 24 months that stems from insecure Internet of Things devices, a survey by The Ponemon Institute found.  a nearly universal belief that such devices will lead to a “catastrophic” security incident within the next 24 months, while more...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/342531572/0/thesecurityledger -->»Related StoriesTwitter Hack is latest to underscore Third Party App RiskCisco Ramps up Security for Things with IOT Threat DefenseMush and Muscle: Mixed Reaction to Trump’s Executive Order on Cyber Guideline
Blog.webp 2017-05-31 14:17:03 Podcast – Smart Vehicle Security: A Report from the Lab (lien direct) In-brief: In this Security Ledger podcast, Paul speaks with Sameer Dixit of Spirent Security Labs, a leading tester of connected (“smart”) vehicles. Truly secure, connected vehicles may be years away, he says. In the meantime, security flaws and poorly implemented features are a major issue, Dixit says, with many car companies still...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/340882558/0/thesecurityledger -->»Related StoriesReport: Major Upgrade, Investments Needed to Secure Connected Vehicles, InfrastructureReport warns of Robot Hacks, TamperingOur Analog Future: Experts Call for Preserving Copper, Pneumatic Systems as Hedge for Cyber Risk Guideline ★★★★
Last update at: 2024-04-27 19:08:09
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter