No prize, because it's too easy: SVR Tracking had an unsecured AWS S3 bucket
A US outfit that sells vehicle tracking services has been accused of leaving more than half a million records in a leaky AWS S3 bucket.
23 hours ago Adobe Accidentally Posts Private PGP KeySecurityWeek View Synopsis+1
Adobe's product security incident response team (PSIRT) accidentally published a private PGP key on its blog. The compromised key was quickly revoked and a new key was generated after the incident came to light.
22 hours ago Verizon Engineer Exposes Internal System DataSecurityWeek View Synopsis+1
Researchers discovered an unprotected Amazon Web Services (AWS) S3 bucket containing potentially sensitive information associated with a system used internally by Verizon.
22 hours ago Adobe accidentally releases private PGP keyZDNet View Synopsis+1
The firm's security team failed in a spectacular fashion.
Lawsuit Seeks Reimbursement for Breach-Related Fraud, Card-Reissuing CostsSummit Credit Union of Wisconsin is seeking class-action status for a lawsuit against credit bureau Equifax. The credit union contends it will have to bear the fraud costs resulting from Equifax exposing a massive amount of U.S. consumer data, in one of the worst data breaches ever seen.
Macquarie Government joins Sliced Tech and Vault Systems in offering the Australian government protected-level cloud services.
The NETwork Basic Input Output System (NET-BIOS) was introduced at the same time IBM announced the PC Network in 1984. The network microcode was the foundation for program control of the IBM LANs; it resides in ROM on the Adapter Card, on diskette, or on the PC's motherboard.
Ethical, security, and safety issues about autonomous vehicles could have dire consequences, which is why pundits feel legislation is critical.
Black Hat Europe to reveal more trouble for Chipzilla's leaky Management Engine
Security researchers say they've found a way to exploit Intel's accident-prone Management Engine, and will reveal the problem at Black Hat Europe in December.
Just as Apple launched the latest version of macOS, High Sierra 10.13, a researcher published a video to show how unsigned applications can steal data from the operating system's Keychain password management system.
Companies cynically dismissing blockchain buzz, risk getting caught unawares by substantive industry disruption. The widespread emergence of blockchain will take some time, but leaders are taking action right now.
24 minutes ago Enterprise Architecture is an MBA subjectIT Toolbox Blogs View Synopsis+1
"The MBA degree originated in the United States in the early 20th century when the country industrialized and companies sought scientific approaches to management.The core courses in an MBA program cover various areas of business such as accounting, finance, marketing, human resources, operations and statistics in a manner most relevant to management analysis and
54 minutes ago Docs ran a simulation of what would happen if really nasty malware hit a city's hospitals. RIP :(The Register View Synopsis+1
Equipment still taking too long to patch, leaving systems exposed
DerbyCon Electronic medical equipment is supposed to help humans save lives, but their lamentable security could result in considerable death, we were warned over the weekend.
'Global in perspective, regional in focus' is the mantra underpinning Australia's forthcoming International Cyber Engagement Strategy -- but with trade come norms of behaviour, and enforcement.
1 hour ago Don't Practice FailureIT Toolbox Blogs View Synopsis+1
At some point in every person's work day, week or month we need to convince someone of something. Some of us are good at it. Others not so much. With some thought and practice, everyone can get better.
I've been down this path too many times myself. I know what I want someone to do. I have all the facts ready to go. I know the data and the
The biggest challenge Australia's BlueScope Steel has is shifting to an Internet of Things-ready world.
1 hour ago Boffins take biometric logins to heart, literally: Cardiac radar IDs users to unlock their PCsThe Register View Synopsis+1
2026, when a change of heart will mean a pretty bad day
The next form of biometric identification may be a heart scan.
The newest iCloud threat is preventing some people from using their Apple devices. Here are five steps to shore up iCloud security and protect Apple devices from being exposed to ransom attacks.
The roadmap for the state government's one-stop-shop for service delivery includes the rollout of multi-factor authentication, but on an opt-in basis.
9 hours ago Preventing Attacks from SpreadingInfoRiskToday View Synopsis+1
Network by network, device by device, today's security threats spread through an organization like wildfire. But Druce MacFarlane of Bricata says security leaders are making fundamental mistakes with their focus on perimeter and endpoint security.
One of the 'big four' providers of professional services suffered a cyber-attack that the company failed to notice for months, but with reportedly few clients affected.
Rabbani found guilty, vows to appeal after resisting demand for iPhone, laptop passcodes
Muhammad Rabbani, international director of human-rights non-profit CAGE, was today found guilty of a terrorist offense for refusing to unlock his iPhone and laptop for the police when entering the UK.
10 hours ago 4 New Trends in VoIP TechnologyIT Toolbox Blogs View Synopsis+1
Voice over Internet Protocol (VoIP) is quickly becoming the de facto communication tool for businesses big and small. Available in a variety of formats, including hosted and cloud, VoIP can be tailored to suit the needs of almost any company. Likewise, as an internet-based technology, the cost advantage of having one phone and data provider is often significant. As VoIP becomes increasingly popular,
11 hours ago Four Years Since HIPAA Omnibus: What's Changed?InfoRiskToday View Synopsis+1
Has Rule Had Impact on Breach and Enforcement Trends?It's been four year since the HIPAA Omnibus Rule went into effect. So what have been the most significant changes in compliance and breach trends since then?