What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2018-06-04 21:22:01 Episode 99: Are we criminalizing reuse? An Exclusive Interview with Eric Lundgren (lien direct) In this week's episode of The Security Ledger Podcast (#99), we bring you an exclusive interview with Eric Lundgren, the celebrated entrepreneur who has helped revolutionize the recycling of electronic waste through his company IT Asset Partners, but who will soon start serving a 13 month jail sentence for copyright infringement for distributing...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/550068306/0/thesecurityledger -->»
Blog.webp 2018-06-01 13:02:02 EFF, others expand protest U.S. plans to vet social media for visas (lien direct) The Electronic Frontier Foundation and other civil liberties groups are protesting the U.S. State Department’s proposal to collect social media profiles from Visa holders.  Privacy and civil-liberties advocates continue to do battle with the U.S. government over its plans to require all foreigners entering the country to divulge social...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/549468774/0/thesecurityledger -->»
Blog.webp 2018-05-31 11:12:01 FDA Medical Device Plan: a Baby Step in the Right Direction (lien direct) In this industry perspective, Dan Lyon and Taylor Armerding of the firm Synopsys discuss the impact of the FDA’s new Medical Device Safety Action Plan, which promises to improve the cyber security of medical devices…eventually.  The federal Food and Drug Administration's (FDA) recently released Medical Device Safety Action Plan...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/549203762/0/thesecurityledger -->»
Blog.webp 2018-05-29 12:30:04 GDPR is Here: What Now? (lien direct) Now that the EU General Data Protection Regulation (GDPR) is upon us…what happens now? In this industry perspective, Steve Schlarman of RSA writes that GDPR compliance isn’t a one time affair – the requirements of the law are likely to be woven into the fabric of how businesses operate inside and outside the EU.  When the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/548753032/0/thesecurityledger -->»
Blog.webp 2018-05-29 11:50:03 Episode 98: using Physics to crash hard drives and making sense of IoT standards (lien direct) In this episode of The Security Ledger Podcast (#98): can sound waves be used to crash a hard drive? We’ll talk to one member of an international team of researchers who showed that, yes they can. And Fractional CISO Rob Black joins us to talk about Internet of Things security standards. With so many to choose from, will we ever see “one...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/548747210/0/thesecurityledger -->»
Blog.webp 2018-05-28 10:36:05 Researchers Use Sonic Attacks to crash Hard Drives (lien direct) Teams from The University of Michigan and and Zhejian University in China have shown how acoustic attacks from off the shelf speakers can be used to crash magnetic hard disk drives, the latest example of physics-based attacks on common hardware.  Add sonic attacks to the list of threats to critical IT systems. Researchers have shown that...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/548567806/0/thesecurityledger -->»
Blog.webp 2018-05-25 12:38:03 Report: Hacker group behind Trisis Malware expanding Activity in Middle East (lien direct) The nation-backed hacker group behind the TRITON/TRISIS malware attack is increasing its nefarious activity, putting critical infrastructure systems in danger of future cyber attacks, according to Dragos Security. The group, which the security firm tracks as XENOTIME, not only remains active, but also appears to be widening its scope of potential...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/548061724/0/thesecurityledger -->»
Blog.webp 2018-05-24 12:42:00 Everybody reboot! VPNFilter Malware infects 500k Routers (lien direct) Newly discovered malicious software dubbed VPNFilter has infected hundreds of thousands of routers and network attached storage (NAS) devices globally and could be used to steal sensitive data or wipe out (“brick”) the devices, the company said.  Cisco’s Talos research group warned on Wednesday that newly discovered malware,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/547842974/0/thesecurityledger -->» VPNFilter
Blog.webp 2018-05-24 02:34:01 FBI exaggerated inability to access encrypted devices in promotion of \'Going Dark\' problem (lien direct) The FBI has mislead Congress and the public about the extent to which encrypted cellphones are hampering federal investigations by preventing authorities from accessing the devices–presumably to support the agency’s own agenda to gain backdoor access to them. The FBI claimed that its investigators were locked out of nearly 7,800...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/547772640/0/thesecurityledger -->» Guideline
Blog.webp 2018-05-21 13:58:03 Episode 97: On eve of GDPR frightening lack of data privacy, security in US (lien direct) In this episode, #97: we talk with Robert Xiao, the Carnegie Mellon researcher who investigated Location Smart, a free web application that allowed anyone track the location of a mobile phone using just the phone’s number. Also: we welcome University of Washington Researcher Kate Starbird back into the SL studio to talk about her latest...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/547217818/0/thesecurityledger -->»
Blog.webp 2018-05-17 00:27:05 DHS announces New Cybersecurity Strategy (lien direct) The U.S. Department of Homeland Security (DHS) has a new strategy to steer its cybersecurity efforts to meet what it recognizes as a growing threat to U.S. national security and critical infrastructure days after the White House eliminated its Cybersecurity Coordinator position. The simultaneous decisions by the White House show the persistent...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/546260770/0/thesecurityledger -->»
Blog.webp 2018-05-16 09:00:02 Report: Major attack on critical infrastructure expected due to increased risk from IoT (lien direct) The majority of security professionals expect a major and imminent attack on critical infrastructure in the next several years and blame the largely unsecured Internet of Things (IoT) for the increased risk in the sector, according to a report by IoT security firm Pwnie Express. Eighty-five percent of security professionals surveyed in an annual...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/546132136/0/thesecurityledger -->»
Blog.webp 2018-05-15 12:14:03 Opinion: Better Code Won\'t Save Developers in the Short Run (lien direct) A lot changed in the 4 years between the last two OWASP Top 10 lists. In this end user perspective, security pro Dino Londis talks about those changes and argues that organizations need to address the most common web application attacks, even as they work to engineer a new generation of secure applications.   According to OWASP, “Insecure...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/545933862/0/thesecurityledger -->»
Blog.webp 2018-05-14 22:18:03 Episode 96: State Elections Officials on Front Line against Russian Hackers (lien direct) In this episode of The Security Ledger Podcast (#96): with primary elections taking place in states across the United States in the coming weeks, we talk to John Dickson about how state elections offices have become the front line in a pitched battle with state-sponsored hackers – with the fate of a 240 year democracy hanging in the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/545804008/0/thesecurityledger -->»
Blog.webp 2018-05-11 15:31:01 Russian Fake News Ecosystem Targets Syrian Human Rights Workers (lien direct) Kremlin linked news sites like RT and Sputnik figure prominently in an online disinformation campaign portraying Syrian humanitarian workers (“White Helmets”) as terrorists and crisis actors, according to an analysis by researchers at University of Washington and Harvard.  An online “echosystem” of propaganda websites...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/545073502/0/thesecurityledger -->»
Blog.webp 2018-05-09 21:57:05 Cyber Attacks May Be Early Consequence of Trump Exiting Iran Nuclear Deal (lien direct) President Trump’s decision to exit from the Iran nuclear deal doesn’t bode well for U.S. cybersecurity and likely will spur cyber attacks on a number of U.S. industries from the Islamic State, a new report from Recorded Future has found. On Tuesday, Trump said the United States would not renew the waivers on sanctions against Iran and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/544643156/0/thesecurityledger -->»
Blog.webp 2018-05-09 14:42:04 Concerned over cyber espionage, U.S. military bans sale of Chinese smartphones (lien direct) Are smartphones made in China trying to spy on us? Top U.S. security officials and the Department of Defense (DoD) think it's possible, prompting a ban on the sale of Chinese smartphones military base exchanges worldwide. All Huawei and ZTE cellphones, personal mobile Internet modems, and related products will no longer be sold by concessions at...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/544550668/0/thesecurityledger -->»
Blog.webp 2018-05-09 13:12:02 Opinion: Don\'t Be Blinded by APTs (lien direct) In this industry perspective, Thomas Hofmann of Flashpoint says that sensational coverage of advanced persistent threat (APT) actors does little to help small and mid sized firms defend their IT environments from more common threats like cyber criminals. The key to getting cyber defense right is understanding the risks to your firm and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/544528310/0/thesecurityledger -->»
Blog.webp 2018-05-07 16:32:01 Episode 95: Copyright Insanity sends E-Waste Recycler to Prison and IoT Inspector finds Insecure Things (lien direct) In this episode of The Security Ledger podcast (#95): has the Digital Millennium Copyright Act taken us over a bridge too far? We talk with two experts about the case of Eric Lundgren, a celebrated e-waste recycler who has been sentenced to 15 months in prison and fined $50,000 for DMCA violations. Also: we speak with one of the Ivy League...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/544080332/0/thesecurityledger -->»
Blog.webp 2018-05-03 20:00:05 Next privacy trap for consumers? Their cars. (lien direct) With flak still flying in the battle over the privacy of data shared on social networks, consumer advocates are raising a red flag about the data that is being collected and shared using another type of consumer platform: automobiles. Manufacturers such as BMW, General Motors (GM), Nissan, Tesla and Toyota are selling vehicles with data...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/543365614/0/thesecurityledger -->» Tesla
Blog.webp 2018-05-02 14:23:00 Spotlight: Deepika Chauhan of Digicert on the Challenges of Securing the Internet of Things (lien direct) There’s an epidemic of insecure Internet of Things devices. But why? And what is the shortest path to ending that epidemic? In this Spotlight Edition of The Security Ledger Podcast, we speak with Deepika Chauhan, the Executive Vice President of Emerging Markets at DigiCert. Her job: forging new paths for the use of public key encryption to...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/543089748/0/thesecurityledger -->»
Blog.webp 2018-05-01 20:57:01 BLU settles with FTC over unauthorized transmission of personal customer data to China (lien direct) Florida-based mobile device maker BLU has settled with the Federal Trade Commission (FTC) over charges it allowed a Chinese partner to collect detailed personal customer information from some of its devices without authorization or consent. The move is one of the first official government actions in the United States to result from tighter...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/542959702/0/thesecurityledger -->»
Blog.webp 2018-04-30 14:41:01 Podcast Episode 94: Black Report takes Hacker View and Securing the Open Source Supply Chain (lien direct) In this episode of the Security Ledger Podcast we do a deep dive into the recent Black Report by NUIX – which flips the script by asking hackers and pen testers their opinions about how they hack firms and what defensive strategies and technologies work best at stopping them. Also: Rami Sass the CEO and co-founder of this week’s...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/542632524/0/thesecurityledger -->»
Blog.webp 2018-04-26 22:30:00 Spotlight: Philippe Courtot, CEO of Qualys: We Need to Change How We Do Security (lien direct) In this Spotlight Podcast*, Philippe Courtot of the firm Qualys discusses being an early innovator in the software as a service space and how the market for cloud based security services has evolved since he launched his firm, Qualys, almost two decades ago.  If you walked the trade show floor at last week's RSA Conference as I did, it is easy...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/541823684/0/thesecurityledger -->»
Blog.webp 2018-04-23 21:58:04 Report: Chinese Ties to US Tech Firms put Federal Supply Chain at Risk (lien direct) China poses a serious and immediate cybersecurity threat to the federal supply chain in part because of connections Chinese state-owned enterprises (SOEs) have to key tech companies working in the government sector, a report recently issued by the U.S. China Commission has found. The report, undertaken by Interos Solutions and the first of its...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/541186216/0/thesecurityledger -->»
Blog.webp 2018-04-23 15:46:04 Podcast Episode 93: Talking GDPR with Cisco\'s Chief Privacy Officer and RSA 2018 Recap (lien direct) This episode of The Security Ledger Podcast (#93) was sponsored by Keysight Technologies, a leading technology company that helps enterprises, service providers, and governments accelerate innovation to connect and secure the world. Check them out at Keysight.com. In this episode: with the May 25th go-live date of the EU General Data Privacy...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/541122716/0/thesecurityledger -->» Guideline
Blog.webp 2018-04-20 16:16:00 A Tale of Two Industries: the RSA Conference in 2018 (lien direct) Best of times worst of times? Check. Age of wisdom age of foolishness? Check. A look at this year’s RSA Conference and some of the big take-aways from the show.  Charles Dickens began his 1859 masterpiece about the French Revolution, A Tale of Two Cities, with one of the most famous and oft-cited opening sentences. It starts: “It was...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/540569538/0/thesecurityledger -->»
Blog.webp 2018-04-18 16:03:03 Microsoft, Facebook and other tech giants join forces on cybersecurity (lien direct) In light of increased and more sophisticated threats in the cybersecurity landscape, tech giants have vowed to get more serious about protecting their customers by working together through a new Cybersecurity Tech Accord. Thirty-four companies-including Microsoft, Oracle, HP, Facebook, Cisco, Nokia TrendMicro and others-have signed on to the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/540062808/0/thesecurityledger -->»
Blog.webp 2018-04-18 14:15:04 Russia blocks 800K Amazon sites in Telegram crackdown, disables legitimate ones in the process (lien direct) Russia this week blocked hundreds of thousands of Amazon Web Services (AWS) sites in an apparent attempt to eliminate the secure Telegram messaging service from its borders. In the process, however, the government also disabled a number of legitimate websites operating in the country as well. Telegram is a service akin to WhatsApp that’s...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/540034936/0/thesecurityledger -->»
Blog.webp 2018-04-16 21:31:02 Podcast Episode 92: Uncle Sam Ices Tech Acquisitions and RSA Conference 2018 (lien direct) In this episode of The Security Ledger Podcast (#92): Adam Isles of The Chertoff Group joins us to talk about the growing specter of software supply chain risk the recent trend of the US Government shooting down major tech acquisitions by Chinese firms.  Also: with the RSA Conference * kicking off in San Francisco, we hear from two experts from...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/539626018/0/thesecurityledger -->»
Blog.webp 2018-04-15 14:44:05 Where to find Security Ledger at The RSA Conference (lien direct) The RSA Conference kicks off in San Francisco on Monday. Security Ledger will be there checking out the conference and meeting and talking with some of the top minds in the information security industry. Check out our schedule of appearances for the week.  The RSA Security Conference kicks off in San Francisco this week. The Security Ledger will...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/539369738/0/thesecurityledger -->»
Blog.webp 2018-04-12 21:00:01 (Déjà vu) Report: EU may slap new GDPR Fines on Old Data Breaches (lien direct) The European Union (EU) wants to send a clear message to companies that it's serious about data privacy, suggesting it will still slap fines on data breaches that happen even before the EU General Data Protection Regulation (GDPR) takes effect in late May if companies don’t disclose them first. Covering up data breaches in the EU that deal...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/538854592/0/thesecurityledger -->»
Blog.webp 2018-04-12 21:00:01 Report: EU will slap new GDPR Fines on Old Data Breaches (lien direct) The European Union (EU) wants to send a clear message to companies that it's serious about data privacy, suggesting it will still slap fines on data breaches that happen even before the EU General Data Protection Regulation (GDPR) takes effect in late May if companies don’t disclose them first. Covering up data breaches in the EU that deal...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/538854592/0/thesecurityledger -->»
Blog.webp 2018-04-11 12:53:00 SirenJack bug puts emergency alert sirens at risk for hacks (lien direct) Researchers have found a vulnerability in emergency-alert systems provided by ATI Systems that could put millions at risk by allowing hackers to sound false alarms or otherwise mislead the public in regards to warning of natural and man-made disasters in the United States. Bastille, which specializes in software-defined radio enterprise threat...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/538528038/0/thesecurityledger -->» Guideline
Blog.webp 2018-04-09 16:24:00 Podcast Episode 91: Fighting Fake News with or without Facebook and whats with all the Cryptojacking? (lien direct) In this episode of The Security Ledger Podcast (#91): with Facebook CEO Mark Zuckerberg saying he will testify before Congress, we ask Harvard’s Matthew Baum about what Congressmen and women should ask him and how to best fight fake news. Also: Adam Kujawa of Malwarebytes updates us on that company’s latest quarterly threat report and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/538059464/0/thesecurityledger -->»
Blog.webp 2018-04-04 15:03:05 Pipeline Attacks highlight Third Party Threat to Critical Infrastructure (lien direct) Recent attacks on the third-party data system of several U.S. pipeline companies highlight the persistent need for better ways to secure industrial control systems (ICSs), particularly when third-party software is in use, security experts said. Over the past several days, four U.S. pipeline companies reported a blackout of their data...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/537255542/0/thesecurityledger -->»
Blog.webp 2018-04-03 22:06:05 AggregateIQ Data reveals tools behind pro-Brexit Leave campaigns (lien direct) There’s more on data discovered in an online breach by AggregateIQ: information tying the obscure Canadian company to pro-Brexit organizations and their activities in the United Kingdom. Analysis by the firm UpGuard reveals that AggregateIQ did a significant amount of work on behalf of groups active in the “Leave” campaign for the United...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/536894654/0/thesecurityledger -->»
Blog.webp 2018-04-02 21:56:03 Podcast Episode 90: WannaCry zombie haunts Boeing, UL tests for cyber security and Harvard war games election hacking (lien direct) In this week's podcast, Episode #90: has the WannaCry ransomware returned from the dead? We talk with an expert from Juniper Networks about what might be behind the outbreak at Boeing. Also: Underwriters Lab and Johnson Controls join us on the podcast to talk about a recent milestone: UL’s award of the first ever Level 3 certificate for...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/536674118/0/thesecurityledger -->» Wannacry
Blog.webp 2018-03-30 15:52:00 Fitness Hacker: Under Armour breach affects 150m (lien direct) The fitness gear maker Under Armour said on Thursday that a breach of its MyFitnessPal website in February resulted in the theft of data on 150 million customers.  Under Armour said it learned of the incident on March 25. The breach affected individuals with MyFitnessPal user accounts. Personal information including the individuals’ user...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/536077620/0/thesecurityledger -->»
Blog.webp 2018-03-28 16:11:04 Trail from AggregateIQ Data Leak points to GOP-Linked Firms (lien direct) A data leak by a company called AggregateIQ has revealed that the obscure Canadian firm developed the software Cambridge Analytica used and sold to clients during the 2016 election to help Republican campaigns target voters, security firm UpGuard revealed this week. Clues in the data suggest other well known GOP linked data and research firms were...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/535654340/0/thesecurityledger -->»
Blog.webp 2018-03-27 10:00:01 Taking the Long View of Breach Fallout (lien direct) In this industry perspective, Thomas Hofmann, the Vice President of Intelligence at the firm Flashpoint warns that the effects of data breaches can often be felt months or years after the actual incident, as stolen data bubbles up in underground marketplaces. He has three pieces of advice for companies that want to develop an incident response...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/535369694/0/thesecurityledger -->»
Blog.webp 2018-03-26 17:13:05 Report: Organizations say IoT devices pose \'catastrophic risk\', then shrug (lien direct) The majority of corporations fear that a “catastrophic” security incident stemming from the Internet of Things (IoT) is an imminent risk. However, those same organizations still lack simple knowledge of how many IoT devices they have in their organization and how they are being used, let alone have oversight for how to protect them, according...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/535237400/0/thesecurityledger -->»
Blog.webp 2018-03-26 16:08:00 Podcast Beta Deaths: are we driving too fast towards Autonomous Vehicles? (lien direct) In this week’s Security Ledger Podcast (Episode #89) we talk with Beau Woods of The Atlantic Council and the advocacy group I Am The Cavalry about the death of 49-year-old Elaine Herzberg, who was struck and killed by an autonomous vehicle operated by Uber. Also: following Facebook’s privacy meltdown with Cambridge Analytica,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/535224376/0/thesecurityledger -->» Uber
Blog.webp 2018-03-20 22:47:05 Autonomous vehicles could save more lives than they take. That might not matter. (lien direct) Autonomous driving technology has the potential to save many more lives than it takes. But that may not matter if the public becomes convinced that autonomous vehicles are a danger to society.  Will the death of a pedestrian in Tempe, Arizona derail the self-driving car initiatives of firms like Uber, General Motors and Tesla? The answer greatly...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/533862288/0/thesecurityledger -->» Uber Tesla
Blog.webp 2018-03-20 19:24:02 For Facebook\'s Stamos, conflicts over breaches and disclosure a theme (lien direct) The departure of Facebook Chief Information Security Officer Alex Stamos is just the latest in which the respected security executive clashed with higher ups over the handling of a major data breach.  Stamos will leave Facebook in August after clashes over how the company dealt with the spread of misinformation on the social network by Russia...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/533819332/0/thesecurityledger -->»
Blog.webp 2018-03-19 21:40:02 Podcast Episode 88: Inside Russia\'s DragonFly Group and How Cyber Crooks Launder Money (lien direct) In this week's Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US....Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/533605684/0/thesecurityledger -->»
Blog.webp 2018-03-17 18:31:01 Cyber Criminals Launder Billions with Bitcoin, In-game Loot (lien direct) Cyber criminals are laundering billions of ill-gotten gain using crypto currencies like Bitcoin and Monero and in-game currencies for popular online games like World of Warcraft, FIFA Soccer and Grand Theft Auto.  Research sponsored by the security firm Bromium and conducted by researchers at Surrey University in England found that cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/533190326/0/thesecurityledger -->»
Blog.webp 2018-03-15 18:45:01 FBI, DHS warn Russian Dragonfly Group Still Targeting US Critical Infrastructure (lien direct) The Department of Homeland Security and the FBI on Thursday warned that the so-called “Dragonfly” hackers linked to the government of Russia are engaged in a “multi-stage intrusion campaign” against U.S. critical infrastructure, including the energy, nuclear, aviation and manufacturing sectors.  In a joint Technical Alert,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/532776068/0/thesecurityledger -->»
Blog.webp 2018-03-15 01:34:02 (Déjà vu) UPDATED: Damning Report Has AMD Investigating Critical Vulnerabilities in Ryzen, EPYC Chips (lien direct) Chip maker AMD acknowledges it is looking into critical vulnerabilities and an exploitable backdoor in its latest line of processors after an Israel-based security firm ambushed the company with a report this week detailing more than a dozen serious security holes in its products. The report and accompanying website-which went public on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/532608976/0/thesecurityledger -->»
Blog.webp 2018-03-15 01:34:02 Damning Report Has AMD Investigating Critical Vulnerabilities in Ryzen, EPYC Chips (lien direct) Chip maker AMD acknowledges it is looking into critical vulnerabilities and an exploitable backdoor in its latest line of processors after an Israel-based security firm ambushed the company with a report this week detailing more than a dozen serious security holes in its products. The report and accompanying website-which went public on...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/532608976/0/thesecurityledger -->»
Last update at: 2024-04-24 15:08:24
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter