Threat Level: green Handler on Duty: Renato Marinho

SANS ISC: Information Security News - Internet Security | DShield Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago Guess - go on, guess - where a vehicle tracking company left half a million records

The Register View Synopsis+1
No prize, because it's too easy: SVR Tracking had an unsecured AWS S3 bucket

A US outfit that sells vehicle tracking services has been accused of leaving more than half a million records in a leaky AWS S3 bucket.

23 hours ago Adobe Accidentally Posts Private PGP Key

SecurityWeek View Synopsis+1

Adobe's product security incident response team (PSIRT) accidentally published a private PGP key on its blog. The compromised key was quickly revoked and a new key was generated after the incident came to light.

22 hours ago Verizon Engineer Exposes Internal System Data

SecurityWeek View Synopsis+1

Researchers discovered an unprotected Amazon Web Services (AWS) S3 bucket containing potentially sensitive information associated with a system used internally by Verizon.

22 hours ago Adobe accidentally releases private PGP key

ZDNet View Synopsis+1
The firm's security team failed in a spectacular fashion.

21 hours ago Credit Union Sues Equifax Over Breach-Related Fraud Costs

InfoRiskToday View Synopsis+1
Lawsuit Seeks Reimbursement for Breach-Related Fraud, Card-Reissuing CostsSummit Credit Union of Wisconsin is seeking class-action status for a lawsuit against credit bureau Equifax. The credit union contends it will have to bear the fraud costs resulting from Equifax exposing a massive amount of U.S. consumer data, in one of the worst data breaches ever seen.

Top News

7 hours ago Macquarie Government claims protected-level cloud accreditation from ASD

ZDNet View Synopsis+1
Macquarie Government joins Sliced Tech and Vault Systems in offering the Australian government protected-level cloud services.

6 hours ago The LAN: A History of Network Operating Systems Part 11

IT Toolbox Blogs View Synopsis+1
The NETwork Basic Input Output System (NET-BIOS) was introduced at the same time IBM announced the PC Network in 1984. The network microcode was the foundation for program control of the IBM LANs; it resides in ROM on the Adapter Card, on diskette, or on the PC's motherboard.

4 hours ago Why laws regulating autonomous vehicles are needed now

TechRepublic View Synopsis+1
Ethical, security, and safety issues about autonomous vehicles could have dire consequences, which is why pundits feel legislation is critical.

4 hours ago Researchers promise demo of 'God-mode' pwnage of Intel mobos

The Register View Synopsis+1
Black Hat Europe to reveal more trouble for Chipzilla's leaky Management Engine

Security researchers say they've found a way to exploit Intel's accident-prone Management Engine, and will reveal the problem at Black Hat Europe in December.

1 hour ago Unsigned Apps Can Steal macOS Keychain Passwords

SecurityWeek View Synopsis+1

Just as Apple launched the latest version of macOS, High Sierra 10.13, a researcher published a video to show how unsigned applications can steal data from the operating system's Keychain password management system.

14 hours ago SAPVoice: We Are Underestimating Blockchain's Value, Despite The Hype

Forbes View Synopsis+1
Companies cynically dismissing blockchain buzz, risk getting caught unawares by substantive industry disruption. The widespread emergence of blockchain will take some time, but leaders are taking action right now.

Latest News

24 minutes ago Enterprise Architecture is an MBA subject

IT Toolbox Blogs View Synopsis+1

"The MBA degree originated in the United States in the early 20th century when the country industrialized and companies sought scientific approaches to management.The core courses in an MBA program cover various areas of business such as accounting, finance, marketing, human resources, operations and statistics in a manner most relevant to management analysis and

54 minutes ago Docs ran a simulation of what would happen if really nasty malware hit a city's hospitals. RIP :(

The Register View Synopsis+1
Equipment still taking too long to patch, leaving systems exposed

DerbyCon Electronic medical equipment is supposed to help humans save lives, but their lamentable security could result in considerable death, we were warned over the weekend.

1 hour ago Supporting digital trade a key element of Australia's cyber diplomacy: Feakin

ZDNet View Synopsis+1
'Global in perspective, regional in focus' is the mantra underpinning Australia's forthcoming International Cyber Engagement Strategy -- but with trade come norms of behaviour, and enforcement.

1 hour ago Don't Practice Failure

IT Toolbox Blogs View Synopsis+1

At some point in every person's work day, week or month we need to convince someone of something.  Some of us are good at it.  Others not so much.  With some thought and practice, everyone can get better.


I've been down this path too many times myself.  I know what I want someone to do.  I have all the facts ready to go.  I know the data and the

1 hour ago "‹BlueScope Steel: Even Colorbond needs cyber resilience

ZDNet View Synopsis+1
The biggest challenge Australia's BlueScope Steel has is shifting to an Internet of Things-ready world.

1 hour ago Boffins take biometric logins to heart, literally: Cardiac radar IDs users to unlock their PCs

The Register View Synopsis+1
2026, when a change of heart will mean a pretty bad day

The next form of biometric identification may be a heart scan.

4 hours ago How to secure iCloud to minimize ransomware threats on your Apple devices

TechRepublic View Synopsis+1
The newest iCloud threat is preventing some people from using their Apple devices. Here are five steps to shore up iCloud security and protect Apple devices from being exposed to ransom attacks.

5 hours ago "‹Service NSW to develop multi-factor authentication identity platform as opt-in

ZDNet View Synopsis+1
The roadmap for the state government's one-stop-shop for service delivery includes the rollout of multi-factor authentication, but on an opt-in basis.

9 hours ago Preventing Attacks from Spreading

InfoRiskToday View Synopsis+1
Network by network, device by device, today's security threats spread through an organization like wildfire. But Druce MacFarlane of Bricata says security leaders are making fundamental mistakes with their focus on perimeter and endpoint security.

9 hours ago Deloitte Hack May Have Exposed Emails, Passwords Of Clients And Staff

Forbes View Synopsis+1
One of the 'big four' providers of professional services suffered a cyber-attack that the company failed to notice for months, but with reportedly few clients affected.

10 hours ago Brit broke anti-terror law by refusing to cough up passwords to cops

The Register View Synopsis+1
Rabbani found guilty, vows to appeal after resisting demand for iPhone, laptop passcodes

Muhammad Rabbani, international director of human-rights non-profit CAGE, was today found guilty of a terrorist offense for refusing to unlock his iPhone and laptop for the police when entering the UK.

10 hours ago 4 New Trends in VoIP Technology

IT Toolbox Blogs View Synopsis+1

Voice over Internet Protocol (VoIP) is quickly becoming the de facto communication tool for businesses big and small. Available in a variety of formats, including hosted and cloud, VoIP can be tailored to suit the needs of almost any company. Likewise, as an internet-based technology, the cost advantage of having one phone and data provider is often significant. As VoIP becomes increasingly popular,

11 hours ago Four Years Since HIPAA Omnibus: What's Changed?

InfoRiskToday View Synopsis+1
Has Rule Had Impact on Breach and Enforcement Trends?It's been four year since the HIPAA Omnibus Rule went into effect. So what have been the most significant changes in compliance and breach trends since then?