Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Information Security News - Internet Security | DShield Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

17 hours ago Symantec promises audit-fest to placate Google trust reduction plans

ZDNet View Synopsis+1
TLS certificate vendor says it will even audit its previous audits to prevent having Google reduce its trust on Symantec certificates.

13 hours ago Peace in our time! Symantec says it can end Google cert spat

The Register View Synopsis+1
It's basically a promise to do better and not mess things up

Symantec is hoping to get its certificates back on Google's trust list.…

10 hours ago FTC urged to probe easily penetrated telly-enabled teledildonic toy

The Register View Synopsis+1
Woes whack Wi-Fi webcam willy with weak websec walls

The US Federal Trade Commission has been urged to launch a probe into a hackable sex toy, which is potentially exposing couples' teledildonic frolics to cyberpervs.…

20 hours ago Chipotle may have banished E coli, but now it has a new infection

The Register View Synopsis+1
Another reason to feel queasy when leaving - bank-card-stealing malware

The last quarter has been a trying one for Mexican fast-food chain Chipotle. People are returning to its restaurants after the great 2015 E coli outbreak, but now customers are being struck by a different kind of virus.…

16 hours ago Ransomware incidents surge, education a hot bed for data breaches, according to Verizon

ZDNet View Synopsis+1
Verizon's Data Breach Incident Report for 2017 has a few key takeaways worth noting for healthcare and the education sectors.

Top News

10 hours ago Dark Matter's Self-Destructing Katim Handset Brings Mobile Security To Smartphones

Forbes View Synopsis+1
While cybersecurity is finally being taken seriously by the world's enterprises and everyday users, most of defence is focused on laptops and desktops. For those who have everything, the Katim handset protects the most vulnerable sector of all - the cellphone.

8 hours ago TalkTalk Hack: Two Men Plead Guilty

InfoRiskToday View Synopsis+1
Hacker Encrypted Hard Drives But Left Social Media Chat Trail, Police SayTwo men have pleaded guilty to hacking London-based telecommunications giant TalkTalk in 2015. Police say one of the men boasted in social media account chats about wiping and encrypting his hard drives, as well as taking part in the hack attack.

5 hours ago No more TV for me

IT Toolbox Blogs View Synopsis+1

I do not watch television. I haven't watched it for years. By television I am talking (writing?) about the traditional model of television watching. The sitting in the living room in front of a screen, which used to be surrounded by a huge box holding high voltage electrical components, and changing channels when ever an advertisement comes on. The sort of thing which used to be done as a family

6 hours ago Report: Cyberespionage now most popular form of cybercrime in many industries

TechRepublic View Synopsis+1
According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

1 day ago Picture this: Senate staffers' ID cards have photo of smart chip, no security

ArsTechnica View Synopsis+1
Senate employees just use passwords, and their badges sport a picture of an alternative.

Latest News

5 hours ago Super-secure Pi-stuffed nomx email server box given a good probing

The Register View Synopsis+1
Researcher claims it's riddled with flaws. Vendor denies it

Security researchers claim to have uncovered a variety of serious security holes in a heavily touted secure email server technology. Nomx, the firm behind the device, strongly disputes the claims and has challenged researchers to a hacking challenge, involving the creation of an email account on a designated remotely hosted nomx device.…

6 hours ago State-Affiliated Hackers Responsible for Nearly 1 in 5 External Data Breaches: Verizon DBIR

SecurityWeek View Synopsis+1

The Verizon Data Breach Investigations Report (DBIR) is industry's go-to analysis of security incidents and successful breaches over the previous year. The latest report was published Thursday.

7 hours ago Amazon Echo Look Ushers In A New, Disturbing Era Of Privacy Concerns

Forbes View Synopsis+1
Would you put an IoT camera in your bedroom or bathroom? The Amazon Echo Look is just that, but are we ready to give our private lives over to consumerism?

8 hours ago How Consumers Can Protect Their Privacy In The Wake Of The FCC Privacy Rules Rollback

Forbes View Synopsis+1
Internet privacy took a hit when Congress voted to reverse rules established by the FCC -- but there are ways to keep your personal information hidden.

11 hours ago DoD Launches "Hack the Air Force" Bug Bounty Program

SecurityWeek View Synopsis+1

Following the success of the "Hack the Pentagon" and "Hack the Army" initiatives, the U.S. Department of Defense announced on Wednesday the launch of the "Hack the Air Force" bug bounty program.

16 minutes ago Facebook decides fake news isn't crazy after all. It's now a real problem

The Register View Synopsis+1
Once dismissed by Zuck, misinformation now merits revised security strategy

Analysis Last November at the Techonomy Conference in Half Moon Bay, California, Facebook CEO Mark Zuckerberg dismissed the notion that disinformation had affected the US presidential election as lunacy.…

30 minutes ago Why go to the office?

IT Toolbox Blogs View Synopsis+1

It seems that the holy grail of our working lives is to be able to work from home. Provided, that is, that you work in a field which is applicable to working from home. Nowadays that seems to apply to more and more fields of work than ever before. Thanks to the wonderful counting machines we call computers.

 

All those offices which are little more than cubicle farms. Most of

1 hour ago Easy ways to make your Android device more secure

TechRepublic View Synopsis+1
Android security doesn't have to be a challenge. Here are a few simple and quick ways to make ensure your device is secure.

2 hours ago How an E-Commerce Site Can Complement Your Brick-and-Mortar Operation

IT Toolbox Blogs View Synopsis+1

Think about product launches a decade ago versus today. Ten years ago, it wasn't uncommon to see customers camped out near the entrance of their local mall or big box store so they could be among the first to get their hands on the fresh merchandise. Now, shoppers may prefer to set a reminder on their phone and hover over their screen waiting for the sale to go

2 hours ago Medical Device Cybersecurity: The Risks to Patients

InfoRiskToday View Synopsis+1
Although cyberattacks on medical devices that could potentially harm patients so far have only been demonstrated in lab settings, there have been actual cases involving the hacking of devices to gain access to patient data, says ethical hacker Stephanie Domas.

3 hours ago Why businesses have the wrong cybersecurity mindset, and how they can fix it

TechRepublic View Synopsis+1
The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.

3 hours ago Extending The Office: MS Office And G Suite

IT Toolbox Blogs View Synopsis+1
Google and Microsoft are head to head in the fight to take over the enterprise mind-share for business apps. While Google has started offering G Suite in the recent years, Microsoft has been in the field for a long time with Microsoft Office.

4 hours ago Mysterious Hajime botnet has pwned 300,000 IoT devices

The Register View Synopsis+1
The Dark Knight of malware's purpose remains unknown

Hajime - the "vigilante" IoT worm that blocks rival botnets - has built up a compromised network of 300,000 malware-compromised devices, according to new figures from Kaspersky Lab.…

6 hours ago Get Your Security in Shape for the Public Cloud

SecurityWeek View Synopsis+1

Summer will be here before we know it and for many that means getting off the couch and in shape, but you need a workout program that's right for you. Boot camp, 20-minute abs, high-intensity interval training, you name it - there are a lot of options. Just make sure you pick one that fits your needs and delivers results or be ready to make a switch.  

6 hours ago Mysterious cat-and-mouse-themed Trojan RAT is potentially dangerous, but its creators and purpose remain unclear

ZDNet View Synopsis+1
The highly skilled nature of the threat actors behind Felismus, and their ability to cover their tracks, means that no-one knows their identity or their target.

6 hours ago Interpol Sweep Uncovers Malware Infections Throughout Asia

InfoRiskToday View Synopsis+1
Operation Involved Seven Vendors and Eight CountriesInterpol, working with countries and security vendors, says it has uncovered 270 websites - including some government portals - compromised by malware. In some instances, the websites contained personal data of citizens.

10 hours ago DarkMatter's Katim Handset Brings Mobile Security To Smartphones

Forbes View Synopsis+1
While cybersecurity is finally being taken seriously by the world's enterprises and everyday users, most of defence is focused on laptops and desktops. For those who have everything, the Katim handset protects the most vulnerable sector of all - the cellphone.

10 hours ago Interpol Sweep Uncovers Asia-Wide Malware Infections

InfoRiskToday View Synopsis+1
Operation Involved Seven Vendors and Eight CountriesInterpol, working with countries and security vendors, says it has uncovered 270 websites - including some government portals - compromised by malware. In some instances, the websites contained personal data of citizens.