What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2018-08-28 03:06:03 Podcast Episode 110: Why Patching Struts isn\'t Enough and Hacking Electricity Demand with IoT? (lien direct) In this week's episode (#110): the second major flaw in Apache Struts 2 in as many years and has put the information security community on alert. But is this vulnerability as serious as the last, which resulted in the hack of the firm Equifax? We talk with an expert from the firm Synopsys.  And: we've heard a lot about the risk of cyber...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/566525656/0/thesecurityledger -->» Hack Vulnerability Patching Equifax
Blog.webp 2018-08-24 02:16:02 McAfee Researchers Exploit Smart Plug to attack Smart TV! (lien direct) Researchers from McAfee have demonstrated how a flaw in a Belkin smart switch can be used to access other connected devices on the same network as the switch.  One of the recurrent themes of Internet of Things security might be summarized as “its not the THING, stupid!” In other words: the value of the individual endpoint is...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/565893670/0/thesecurityledger -->»
Blog.webp 2018-08-23 21:40:04 Cisco Links Remote Access Tool Remcos to Cybercriminal Underground (lien direct) Questions are being raised about whether remote-access and testing tools from a mysterious company called Breaking Security are made and sold by cyber criminals, after the tools have been widely adopted as a turnkey solution for setting up and running botnets, according to Cisco Talos. Security researchers said they’ve observed...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/565859182/0/thesecurityledger -->» Tool
Blog.webp 2018-08-23 03:16:00 Spotlight Podcast: Arctic Wolf on Nurturing Talent for the Evolved SOC (lien direct) In this Spotlight Podcast, sponsored by Arctic Wolf Networks: sessions at this month’s Black Hat Briefings on PTSD and substance abuse among security workers are proof that the high pressure, high stakes world of information security can take its toll. So what  does it take to find, train and nurture information security pros? Sam McLane,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/565709896/0/thesecurityledger -->»
Blog.webp 2018-08-21 03:21:01 Podcast Episode 109: What\'s The US Freedom Army? Ask Russia. (lien direct) In this week's episode of the Security Ledger Podcast (#109): what lurks in the dark recesses of online information operations? How about a secret “US Freedom Army” linked to Russia? Dave Aitel of Cyxtera joins us to talk about it. Also: hacking critical infrastructure isn’t just for nation states anymore. Cybereason joins us...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/565374806/0/thesecurityledger -->»
Blog.webp 2018-08-17 15:18:04 Spotlight Podcast: Synopsys\' Dan Lyon on the Challenge of Securing Connected Medical Devices (lien direct) In this Spotlight Podcast, sponsored by Synopsys: In the wake of a presentation at Black Hat about security flaws in implantable pace maker devices, Synopsys Principal Consultant Dan Lyon joins us to talk about why medical device makers struggle to make their connected medical devices more secure. Dan and I discuss some of the flaws in the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/564845726/0/thesecurityledger -->»
Blog.webp 2018-08-16 15:09:05 Stand up for Journalism: Our Most Important, Least Glamorous Profession (lien direct) From the Mỹ Lai Massacre, to Love Canal to clergy sex abuse to the lead in Flint’s water, our awareness of urgent problems in our communities comes not from the West Wing or government officials (themselves elites) but from nosy, dogged and mostly under-compensated reporters doing their jobs and holding the powerful to account. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/564619842/0/thesecurityledger -->» Guideline
Blog.webp 2018-08-15 19:08:01 From Mainframes to Connected Cars: How Software drives the Automotive Industry (lien direct) Automakers must pay as much attention to the integrity and security of the software running modern vehicles as they pay to areas such as metallurgy, impact protection, seat belts, and materials science argues Gary Mcgraw, the Vice President of Security Technology at the firm Synopsis. Software is a relatively new human artifact that grows more...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/564417584/0/thesecurityledger -->»
Blog.webp 2018-08-14 19:28:04 Episode 108: DEF CON\'s Car Hacking Village and is the Open Source Model Failing on Security (lien direct) In this week's podcast (#108), sponsored by CA Veracode: hacker summer camp wrapped up on Sunday, as the 26th annual DEF CON conference concluded at Caesar's Palace in Las Vegas. Hacks of connected and smart vehicles were a big theme again this year. We sat down with the organizers of DEF CON’s Car Hacking Village to see what was news at...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/564156698/0/thesecurityledger -->»
Blog.webp 2018-08-11 19:47:01 DEF CONtests Highlight Hacker Culture\'s Expanding Reach (lien direct) Scores of contests at the annual DEF CON event reveal hacker culture in its Baroque glory, with tests of social engineering and IoT hacking skills taking center stage. They don’t call it “Hacker Summer Camp” for nothing. Attendees to the Black Hat and DEF CON hacker conferences in Las Vegas this week have a dizzying array of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/563648950/0/thesecurityledger -->»
Blog.webp 2018-08-10 15:31:05 Special Black Hat Coverage: Google\'s Parisa Tabriz Says Don\'t Be A Jerk (lien direct) In this special Black Hat edition of the Podcast, sponsored by UL: Parisa Tabriz, Google’s Director of Engineering for the Chrome Web browser, brought some strong medicine to Las Vegas for her Black Hat keynote speech. We talk about why her simple message was so groundbreaking. Also: Ken Modeste of UL joins us from the Black Hat briefings...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/563468130/0/thesecurityledger -->»
Blog.webp 2018-08-10 00:04:00 Can Self Driving Cars Be Secured? Car Hacking Duo Isn\'t Sure (lien direct) Can consumer-owned self-driving cars like those being made by Tesla, BMW and Mercedes and others be secured from cyber attack? The hackers who famously commandeered a Jeep Cherokee using software attacks say they aren’t so sure.  Three years after putting the automotive industry on notice with their remote compromise of a Jeep Cherokee,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/563363548/0/thesecurityledger -->» Tesla
Blog.webp 2018-08-09 21:12:05 Report: Firms Could Use Better Vulnerability Assessment to Fight Cyberthreats (lien direct) Half of organizations are relative teenagers in terms of maturity when it comes to their vulnerability-assessment practices, a key aspect of successful strategies to defend themselves quickly against cyber attacks, a recent report has found. Nearly half, or 48 percent, of the organizations polled in the survey–The Cyber Defender Strategies...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/563343348/0/thesecurityledger -->» Vulnerability
Blog.webp 2018-08-06 19:02:03 Episode 107: What\'s Hot at Black Hat & does DHS need its new Risk Management Center? (lien direct) In this episode of The Security Ledger Podcast (#107): Hacker Summer Camp takes place in Las Vegas this week as the Black Hat, DEFCON and B-Sides conferences take place. We’re joined by DigiCert Chief Technology Officer Dan Timpson to talk about the presentations that are worth seeing. And, in our second segment, The Department of Homeland...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/562827308/0/thesecurityledger -->»
Blog.webp 2018-08-02 19:50:05 As Election Threats Mount, Voting Machine Hacks are a Distraction (lien direct) Beating up on direct record electronic (DRE) voting machines has been popular sport in security circles for more than a decade. But is it a distraction from other, more present and dangerous threats to the integrity of elections? A growing body of evidence says “yes.” In a little more than a week, some of the world’s best hackers...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/562178868/0/thesecurityledger -->»
Blog.webp 2018-08-02 11:58:03 (Déjà vu) Amnesty International says it was Targeted by Israeli Spyware (lien direct) Human rights organization Amnesty International reports it’s been the target of a spyware campaign traced to a secretive Israel cyber-surveillance company and distributed through the chat application WhatsApp. An Amnesty International staff member in June received a WhatsApp message that contained clickbait regarding a Saudi Arabian protest,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/562106895/0/thesecurityledger -->»
Blog.webp 2018-08-02 11:58:03 (Déjà vu) Amnesty International Targeted by Israeli Spyware (lien direct) Human rights organization Amnesty International reports it’s been the target of a spyware campaign traced to a secretive Israel cyber-surveillance company and distributed through the chat application WhatsApp. An Amnesty International staff member in June received a WhatsApp message that contained clickbait regarding a Saudi Arabian protest,...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/562106895/0/thesecurityledger -->»
Blog.webp 2018-08-01 22:19:05 Spotlight Podcast: CSS on why Crypto Agility is the Key to Securing Internet of Things Identities (lien direct) In this Spotlight Edition of the Security Ledger Podcast: identity is at the root of many of the security problems facing the Internet of Things, from vulnerable and “chatty” endpoints to a lack of robust update and lifecycle management features. To figure out how we might start to build a more secure IoT ecosystem, we invited Judah...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/562022662/0/thesecurityledger -->»
Blog.webp 2018-07-31 20:37:00 Exploits in Samsung Hub Put Smart Homes at Risk (lien direct) There is more alarming security news for consumers with smart devices at home: hackers can take remote control of video cameras, thermostats, smart locks or other IoT devices by exploiting vulnerabilities discovered in Samsung’s SmartThings Hub, according to a report by Cisco Systems’ Talos research group. Cisco Talos researchers...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/561798344/0/thesecurityledger -->»
Blog.webp 2018-07-31 16:35:01 Secure Access as a Business Accelerator: a Conversation with Pulse Secure (lien direct) In this Security Ledger Conversations Video, we speak with Sudhakar Ramakrishna, the CEO of the firm Pulse Secure on that company’s journey from Juniper Networks’ remote access business unit to a thriving, independent company selling secure access technology to firms with on premises, cloud and mobile deployments. Technology has...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/561759944/0/thesecurityledger -->»
Blog.webp 2018-07-31 14:28:05 Episode 106: Election Trolls Are Afoot. We Talk To The Guy Who Watches Them (lien direct) In this episode of The Security Ledger Podcast (#106): with the November midterm elections in the U.S. fast approaching, election related shenanigans have already cropped up in connection with contested races in swing states, as well as around “hot button” issues such as gun control and race. To find out what the trolls are trolling...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/561973376/0/thesecurityledger -->»
Blog.webp 2018-07-28 23:00:01 As Right to Repair Effort Falters, Massachusetts moves to study Impact (lien direct) After failing to move a bill to enshrine a right to repair consumer electronics to a vote, the state lawmakers in Massachusetts are pushing to study the economic impact of right to repair legislation. A Massachusetts state Senate resolution passed this week calls for the creation of  a commission to research and make recommendations to the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/561316252/0/thesecurityledger -->»
Blog.webp 2018-07-26 16:56:04 Breaking the Ice on DICE: scaling secure Internet of Things Identities (lien direct) In this Spotlight Podcast, sponsored by Trusted Computing Group,Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of  solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560916326/0/thesecurityledger -->»
Blog.webp 2018-07-26 15:18:05 Report: Cybercriminals target difficult-to-secure ERP systems with new attacks (lien direct) Cybercriminals are targeting enterprise resource planning (ERP) apps–some of the oldest and most difficult-to-secure business software systems–with new attacks in an effort to exploit vulnerabilities and gain access to valuable, sensitive enterprise data, according to a new report. In the report released this week by Digital Shadows...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560901858/0/thesecurityledger -->»
Blog.webp 2018-07-25 12:50:05 Expert says: Hack your Smart Home to Secure It (lien direct) Smart home security starts at home, according to researcher Michael Sverdlin who says that consumers should explore the security of their smart home technology and consider simple modifications or hacks to remove insecure or promiscuous features. Not long ago, Michael Sverdlin, the back-end team leader for IoT security startup Vdoo, bought his...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560700964/0/thesecurityledger -->» Hack Guideline
Blog.webp 2018-07-23 17:57:02 Episode 105: Is Trolling a Human Rights Abuse? Also: the Do\'s and Dont\'s of Ransomware Negotiation (lien direct) In this week’s podcast: a report out last week from The Institute for the Future makes clear that state sponsored trolling has gone global and is now a go-to tool for repressive regimes worldwide, constituting a new form of human rights abuse. Ben Nimmo of The Atlantic Council joins us to discuss. Also: ransomware is one of the most...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/560349116/0/thesecurityledger -->» Ransomware Tool
Blog.webp 2018-07-17 23:11:03 Episode 104: Mueller\'s Cyber Eye on the Russian Guys also Reaper Drone Docs Stolen (lien direct) In this week's episode of the podcast (#104): the Mueller indictment of 12 Russian GRU operatives for hacking the 2016 presidential election was a bombshell. It was also 30 pages long. We read it so you don’t have to and we’ll talk about the big take aways. Also: when researchers from Recorded Future saw an offer on a dark web...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/559125228/0/thesecurityledger -->» APT 37
Blog.webp 2018-07-17 22:56:05 Facebook defends itself against report it allowed hate speech for financial gain (lien direct) Facebook has denied allegations by a by a U.K. news outlet that it gave preferential treatment to some pages that promote hate speech because of financial interest, saying that creating a safe environment for its users remains a top priority. The social media giant Tuesday defended itself against a TV report on Channel 4 in the United Kingdom...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/559122296/0/thesecurityledger -->»
Blog.webp 2018-07-12 14:35:00 Military documents about MQ-9 Reaper drone leaked on dark web (lien direct) Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. The firms’ Insikt Group on June 1 observed a bad actor trying to sell...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/557965066/0/thesecurityledger -->» Cloud APT 37
Blog.webp 2018-07-10 21:15:04 Fitness apps: Good for your health, not so much for military security (lien direct) Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/557575456/0/thesecurityledger -->»
Blog.webp 2018-07-10 17:24:00 Episode 103: On the Voice-Controlled Internet, How Will We Authenticate? (lien direct) Voice based interfaces are growing in popularity, complexity and influence. But securing these interfaces has, thus far, been an afterthought. If we are destined to interact with the smart systems around us using our voice, how exactly will we manage to authenticate to those devices? In this podcast we speak with Ben Rafferty of the firm Semafone...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/557539334/0/thesecurityledger -->»
Blog.webp 2018-07-04 21:23:02 Quantum Principles Eyed to Solve Current Limitations in Encryption, Data Protection (lien direct) Quantum principles are set to transform the next generation of Internet security, with new quantum-based technologies on tap to improve encryption and data communication which researchers believe could solve some of the limitations with current technology. Security researchers in the United Kingdom are among those leading the move toward quantum...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/556419674/0/thesecurityledger -->» Guideline
Blog.webp 2018-07-03 22:20:04 Kaspersky Deems Crypto-jacking the New Ransomware as Crypto-miners up Their Game (lien direct) Because of its potential to earn hackers millions in a steady stream of cash, Kaspersky Labs has deemed crypto-jacking the new ransomware in a report that arrived  just as researchers spotted two new types of malware targeting the growing popularity of cryptocurrencies. In its report released last Wednesday, Kaspersky declared that crypto-mining...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/556219478/0/thesecurityledger -->» Ransomware Malware
Blog.webp 2018-07-02 14:45:05 Episode 102: Is Blockchain the Foundation for a Secure Internet of Things? (lien direct) In this episode of the Security Ledger Podcast (#102): we think of blockchain as the immutable and distributed ledger that vouches for crypto currency transactions. But is its real potential as a foundation for a secure Internet of Things? We speak with Vaughan Emery, the CEO of the start-up Atonomi, which markets itself as a secure ledger for...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/556145540/0/thesecurityledger -->»
Blog.webp 2018-06-28 14:58:05 Opinion: With Internet of Things, Devices become Insider Threat (lien direct) Connected devices aren’t just fodder for botnets. They increasingly act as malicious “insiders” capable of spying on their surroundings and providing valuable intelligence on homes and offices, argues Yotam Gutman of the firm Securithings in this industry perspective.  Connected devices present unique challenges to enterprises...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/555124602/0/thesecurityledger -->» Threat
Blog.webp 2018-06-27 19:32:01 Mobile, automation-industry leaders promote two new IoT security efforts (lien direct) Recognizing the persistent need for security to protect connected devices, industry leaders are collaborating through two separate efforts on Internet of Things (IoT) standards and guidelines to help combat the emerging IoT threat landscape. On the mobile front, a number of global operators including  AT&T, China Mobile, China Telecom, China...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554973984/0/thesecurityledger -->» Threat Guideline
Blog.webp 2018-06-26 12:13:05 Akamai Report finds DDoS Attacks more Sophisticated, Adaptive (lien direct) Though they are some of the oldest cyber attacks, Distributed Denial of Service (DDoS) attacks show no signs of going away, with an increase in the number, scope and sophistication of DDoS attacks in the past year, according to a recent report by cloud-delivery platform provider Akamai Technology. The summer edition of Akamai’s State of the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554705676/0/thesecurityledger -->»
Blog.webp 2018-06-26 12:00:05 IoT, Machine Learning and AI in the Security Operations Center (lien direct) A tsunami of security data from Internet of Things endpoints could break the will of SOC analysts. What is needed are better tools for analyzing that data, including the use of machine learning. But AI and machine learning aren’t magic bullets. In this opinion piece, RSA Chief Technology Officer Dr. Zulfikar Ramzan presents a 5 point plan...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554703590/0/thesecurityledger -->»
Blog.webp 2018-06-25 12:30:02 Episode 101: Ink Jet Nation? Doctorow on a Dystopian IoT and City of Atlanta Employees phished on Rogue Wi-Fi (lien direct) In this episode of the podcast (#101): will the Internet of Things enable a glorious future of intelligent and subservient “things”? Or will it birth “ink jet nation:” a dystopia of closed and expensive technology silos that use patents, software licensing and lawsuits constrain the use, reuse and repair of connected...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/554524420/0/thesecurityledger -->»
Blog.webp 2018-06-21 14:19:03 Spotlight Podcast: Why North Korean Summit won\'t End Hacking Threat (lien direct) In this Spotlight Podcast, Jon Condra, the Director of Asia Pacific Research at Flashpoint talks about why U.S. President Donald Trump’s summit with North Korean leader Kim Jong Un won’t put an end to North Korea’s online predation. That is just one conclusion in Flashpoint’s semi yearly Business Risk Intelligence Report. ...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553660194/0/thesecurityledger -->» Guideline
Blog.webp 2018-06-20 15:03:05 \'Olympic Destroyer\' resurfaces; targets financial organizations, chemical-threat-prevention labs (lien direct) The Olympic Destroyer malware behind an attack on the 2018 Winter Olympic Games in Seoul resurfaced with new targets in its sites: financial organizations and biological and chemical threat prevention laboratories, according to new research from Kaspersky Lab. Olympic Destroyer was first spotted back in February as a cyberattack on the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553672430/0/thesecurityledger -->» Malware Threat
Blog.webp 2018-06-19 14:51:04 (Déjà vu) Evasive MyloBot botnet can take over enterprise devices to steal data, spread ransomware (lien direct) A new, extremely evasive botnet has been discovered that takes unique leverage of command and control servers and can completely take over an enterprise device to execute any type of code it wishes, from ransomware to trojans to data extraction, according to researchers at endpoint and mobile security firm Deep Instinct. The malware–which is...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553212694/0/thesecurityledger -->»
Blog.webp 2018-06-19 14:51:04 Evasive new botnet can take over enterprise devices to steal data, spread ransomware (lien direct) A new, extremely evasive botnet has been discovered that takes unique leverage of command and control servers and can completely take over an enterprise device to execute any type of code it wishes, from ransomware to trojans to data extraction, according to researchers at endpoint and mobile security firm Deep Instinct. The malware–which is...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/553212694/0/thesecurityledger -->»
Blog.webp 2018-06-15 13:10:00 RSA Labs: cloud, microservices, mobility shift terrain for security providers (lien direct) In this exclusive interview from April, the head of RSA Labs* says that keeping up with bad guys is only half the job. Security firms also need to work hard to stay relevant as trends like cloud adoption, containerization, microservices and mobility shift the ground under information security providers. It is common knowledge in the security space...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/552370954/0/thesecurityledger -->»
Blog.webp 2018-06-15 03:10:01 U.S. official: Don\'t bring laptops or mobile devices to the World Cup in Russia (lien direct) If you’re going to the FIFA World Cup 2018 in Russia and you’re thinking of taking your laptop or mobile device to the matches, just don’t do it, warned the top U.S. counterintelligence official. William Evanina, an FBI agent and the director of the U.S. National Counterintelligence and Security Center (NCSC), reportedly told...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/552294714/0/thesecurityledger -->»
Blog.webp 2018-06-13 15:45:04 RSAs CTO is Bullish on Security. Blockchain? Not so much. (lien direct) The success of blockchain technology in securing cryptocurrencies doesn’t make the technology a good fit for securing the Internet of Things, RSA Security Chief Technology Officer Zulfikar Ramzan says. Check out our exclusive conversation with Zully about IoT, blockchain and the state of the information security industry.   I had the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/551952978/0/thesecurityledger -->»
Blog.webp 2018-06-12 21:35:01 U.S. sanctions Russian companies, individuals over cyber attacks (lien direct) Acting on an executive order, the U.S. government imposed sanctions on five companies and three individuals for their collaboration with the Russian Federal Security Service (FSB) in state-sponsored cyber-attack activity. Three of the companies hit with sanctions by the U.S. Department of the Treasury are a cybersecurity firm Digital Security and...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/551736030/0/thesecurityledger -->»
Blog.webp 2018-06-12 02:15:03 Episode 100: Estonia\'s Former CIO talks about engineering a secure electronic vote (lien direct) In this week's episode of The Security Ledger Podcast (#100 – woot!): Taavi Kotka spent 4 years as the Chief Information officer for the nation of Estonia – whose government is widely recognized as among the most technologically advanced in the world. He talks about the Estonian model for e-governance and how the U.S. has ruined the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/551554570/0/thesecurityledger -->»
Blog.webp 2018-06-07 13:28:03 Cisco Talos: VPNFilter malware capable of stealing data, infecting IoT endpoints (lien direct) Malware dubbed “VPNFilter” that initially targeted small-office, home routers and network-attached (NAS) storage boxes is spreading globally and affecting more devices than previously thought, extending its reach to endpoint Internet of Things (IoT) devices and into networks to which they are connected, Cisco Talos researchers said...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/550677282/0/thesecurityledger -->» VPNFilter
Blog.webp 2018-06-05 22:14:05 Container ships easy to hack, track, send off course and even sink, security experts say (lien direct) Modern container ships already face a number of serious perils at sea. Now new research from Pen Test Partners shows just how vulnerable these ships are to new dangers from hacking–including being steered off course and sunk–thanks to their use of always-on satellite communications and general lax security practices on board. Pen Test...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/550316112/0/thesecurityledger -->»
Last update at: 2024-04-19 22:08:06
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter