InfoSec

  • newUnsecured Voice Calls Leave the Door Wide Open
    You're reading Unsecured Voice Calls Leave the Door Wide Open originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+VoIP may deliver gre…
    - 11 hours ago Thursday, March 26, 2015 -
  • newHealthcare Businesses in the Crosshairs
    You're reading Healthcare Businesses in the Crosshairs originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+Medical and healthcare data…
    - 11 hours ago Thursday, March 26, 2015 -
  • newKeeping Small Businesses’ Networks Current and Secure
    You're reading Keeping Small Businesses’ Networks Current and Secure originally posted on Informationsecuritybuzz.com. If you've enjoyed this post, be sure to follow informationsecuritybuzz.com on Twitter, Facebook, Linkedin and Google+The technol…
    - 11 hours ago Thursday, March 26, 2015 -
  • new<b>Cyber</b> Threat Information Sharing Bill Advances
    Cyber Threat Information Sharing Bill Advances. by Colin Wilhelm. MAR 26, 2015 8:25pm ET. A long-awaited bill to enhance cybersecurity information ...
    - 12 hours ago Thursday, March 26, 2015 -
  • newDOD warns troops, Families to be <b>cyber</b>-smart
    Terry A. Halvorsen issued a memorandum March 18 about the growing threat of cyber-crime “phishing” and “spear phishing” in emails, on social ...
    - 12 hours ago Thursday, March 26, 2015 -
  • newHenson, <b>Cyber</b> Group Strike Two Title Co-Pro Deal
    The Jim Henson Company and Cyber Group Studios have finalized a first-time agreement to co-finance and co-produce two new children's series: Jim ...
    - 13 hours ago Thursday, March 26, 2015 -
  • new<b>Cyber</b> Security requires vigilance
    Employing simple common sense and an extra dose of vigilance are key in helping to ensure that one does not become a victim of cyber crime.
    - 13 hours ago Thursday, March 26, 2015 -
  • newThe Active International Response to <b>Cyber</b> Crime
    The international cyber-security versus cyber-crime battle is gathering pace and what we're seeing is the formation of international alliances to fight ...
    - 13 hours ago Thursday, March 26, 2015 -
  • newOVERNIGHT CYBERSECURITY: House Intel approves <b>cyber</b> bill
    have offered one cyber-related budget amendment. The amendment would create a cybersecurity deficit-neutral reserve fund to encourage cyber ...
    - 13 hours ago Thursday, March 26, 2015 -
  • newBye bye, booth babes. IT security catwalk RSA nixes sexy outfits

    - 13 hours ago Thursday, March 26, 2015 -
  • newMessage to Errata employees

    Message to Errata employees

    Dear employees,Starting next week, Errata Security will be following RSA Conference's lead and institute a "Morality Dress Code" in order to deal with the problem of loose women on the premises.Attire of an overly revealing or suggestive nature is no…
    - 14 hours ago Thursday, March 26, 2015 -
  • newThe things end users do that drive security teams crazy

    The things end users do that drive security teams crazy

    DumbfoundedImage by imke.stahlmannThere are times as a security professional you can only put your head in your hands and cry. The things people do that put the company at risk can sometimes amaze you. Here are some real-life scenarios provided by CI…
    - 14 hours ago Thursday, March 26, 2015 -
  • newGuest Opinion: UMass is a line of defense against <b>cyber</b> threats
    The increasing number of cyber-attacks on our digital infrastructure prompted President Obama to make cybersecurity a national priority, earmarking ...
    - 14 hours ago Thursday, March 26, 2015 -
  • newChart and image gallery: 30+ free tools for data visualization and analysis
    The chart below originally accompanied our story 22 free tools for data visualization and analysis (April 20, 2011), but we're continuing to update it as we cover additional tools. Newest additions are toward the table bottom.Features: You can sort…
    - 14 hours ago Thursday, March 26, 2015 -
  • new<b>Cyber</b> Hunting: 5 Tips To Bag Your Prey
    Knowing the lay of the land and where attackers hide is a key element in hunting, both in nature and in the cyber realm. Read more.
    - 14 hours ago Thursday, March 26, 2015 -
  • newCourt throws out lawsuit over storage on iPhones, iPads
    A federal court has dismissed a lawsuit against Apple over the amount of storage available in mobile devices that come with iOS 8.The district court in San Jose, California, threw out the proposed class-action suit on Wednesday after Apple filed a mo…
    - 14 hours ago Thursday, March 26, 2015 -
  • newToshiba announces industry's densest 3D flash memory

    Toshiba announces industry's densest 3D flash memory

    Toshiba today announced the development of the first 48-layer, three-dimensional flash memory.Based on a vertical stacking technology that Toshiba calls BiCS (Bit Cost Scaling), the new flash memory stores two bits of data per transistor, meaning i…
    - 14 hours ago Thursday, March 26, 2015 -
  • newSilicon Valley powers: Let mass spying die in May 2015 – it's bad for privacy (and business)

    - 15 hours ago Thursday, March 26, 2015 -
  • newTwitter's Periscope Allows Live Stream Replays

    Twitter's Periscope Allows Live Stream Replays

    Live streaming from mobile devices has been having a rebirth of sorts with the proliferation of 4G, the continued rise of smart devices and the quickening pace of the demise of feature phones. Twitter has been seeking its own rebirth, and it's wageri…
    - 15 hours ago Thursday, March 26, 2015 -
  • newMeltdown! New Periscope iPhone app live streams ice cream factory's end

    Meltdown! New Periscope iPhone app live streams ice cream factory's end

    The teardown of a 50-plus-year-old ice cream plant across from Network World’s Framingham, Mass., headquarters today practically screamed to be live streamed via Twitter’s new Periscope app for the iPhone. So I took my iPhone 5 into the parking…
    - 15 hours ago Thursday, March 26, 2015 -
  • newHow CIOs can woo customer advocates?

    How CIOs can woo customer advocates?

    Time and again, CIOs refer to employees as their "customers," while publicly forcing them to use unwieldy tech tools and privately snickering about their stupid behavior. Then CIOs wonder why they and their IT departments have such terrible reputatio…
    - 15 hours ago Thursday, March 26, 2015 -
  • newBankrupt RadioShack to Auction Off Millions of Customer Records

    Bankrupt RadioShack to Auction Off Millions of Customer Records

    Following RadioShack’s recent bankruptcy filing, the tech retailer is now in the process of selling not only trademarks and real estate, but also millions of customer names, emails and physical addresses. According to a report by Bloomberg, the hig…
    - 15 hours ago Thursday, March 26, 2015 -
  • newFKA Twigs hit back at racist <b>cyber</b> bullies
    British singer/songwriter FKA Twigs felt compelled to publicly respond to the nasty messages she received online for dating actor Robert Pattinson, ...
    - 15 hours ago Thursday, March 26, 2015 -
  • newRed Canary mixes technology and human intuition to help companies fight <b>cyber</b> threats
    Many cybersecurity companies are racing to create the most innovative technology to track, watch, and hopefully prevent cyber attacks. A recently ...
    - 15 hours ago Thursday, March 26, 2015 -
  • newIDG Contributor Network: The medical profession needs to get over its fear of information technology

    IDG Contributor Network: The medical profession needs to get over its fear of information technology

    In a recent article in a national publication, a member of our physician community raked up a debate by declaring the Electronic Health Records (EHR ) mandate to be a debacle and argued that EHR’s actually harm patients.  These are bogus objection…
    - 16 hours ago Thursday, March 26, 2015 -
  • newHacking the Royal Male: the Computer Misuse Act
    A look back by The Register at the Prestel hacking case that directly influenced the drafting of the Computer Misuse Act.The post Hacking the Royal Male: the Computer Misuse Act appeared first on ITsecurity.
    - 16 hours ago Thursday, March 26, 2015 -
  • newIDG Contributor Network: Big data - The anti 'Second Screen'

    IDG Contributor Network: Big data - The anti 'Second Screen'

    "Big Data" Google searches have increased 5X since 2012 The late 2000’s saw the introduction of the mobile application and a supposed new economy. At the same time, the idea emerged that consumers would use mobile applications on their smart pho…
    - 17 hours ago Thursday, March 26, 2015 -
  • newCertificate security – is anything real?
    If communications are monitored and encryption is still Pretty Good, is the bigger challenge not only maintaining control of keys, but ensuring that those deem the websites to be safe are trusted at all? In FireEye’s 2015 M-Trends report, authentic…
    - 17 hours ago Thursday, March 26, 2015 -
  • newHow to pick between the Samsung Galaxy S 6 and GS6 edge

    How to pick between the Samsung Galaxy S 6 and GS6 edge

    This week, Samsung and a set of its U.S. wireless carrier partners announced pricing and availability details for its two latest smartphones, the Galaxy S 6 and GS6 edge. Prices vary by carrier and payment options, but the GS6s will be available star…
    - 17 hours ago Thursday, March 26, 2015 -
  • newHotel Internet Gateways Patched Against Remote Exploit
    A critical vulnerability in a popular hotel and convention center Internet gateway from AntLabs called InnGate has been patched. The flaw allows attackers read and write access to the devices from the Internet.
    - 17 hours ago Thursday, March 26, 2015 -
  • newMIT Researchers Debut Debugger for Integer Overflows
    Students from M.I.T. have devised a new way to scour raw code for integer overflows.
    - 17 hours ago Thursday, March 26, 2015 -
  • newCheap mobile subscriptions the bait as Euro operators become more aggressive
    Consumers seem to be coming out on top as a growing number of European telecom and cable operators offer discounted mobile subscriptions as a bonus for choosing other services.Bundles with broadband, telephony and TV across fixed and mobile networks…
    - 18 hours ago Thursday, March 26, 2015 -
  • newCAPTCHAs May Do More Harm Than Good

    CAPTCHAs May Do More Harm Than Good

    If an annoyance contest were held between passwords and CAPTCHAs, passwords would probably win, but not by much. CAPTCHA -- Completely Automated Public Turing Test To Tell Computers and Humans Apart -- was created to foil bots attempting to mass-crea…
    - 18 hours ago Thursday, March 26, 2015 -
  • newNigeria joins list of African countries threatening prison sentences for mobile operators
    Nigeria, Africa’s largest telecom market, has joined the list of countries on the continent that will impose prison sentences on officials at mobile operators that continually fail to deliver quality services to customers.Tanzania and Zambia are am…
    - 18 hours ago Thursday, March 26, 2015 -
  • newMessaging app usage, retention rates dwarf all other apps

    Messaging app usage, retention rates dwarf all other apps

    Flurry If you're still confused about why Facebook acquired WhatsApp for $19 billion last year and reportedly tried to acquire Snapchat for another obscene sum a few months before that, consider this: Messaging apps are used at least four times more…
    - 18 hours ago Thursday, March 26, 2015 -
  • newJohn McAfee makes new TV appearance to discuss startup life

    John McAfee makes new TV appearance to discuss startup life

    NBC Dateline interview goes from Future Tense to past tense but will it shed any new light?
    - 18 hours ago Thursday, March 26, 2015 -
  • newBrandPost: Microsoft EA 101

    BrandPost: Microsoft EA 101

    Chances are you’ve probably heard of a Microsoft Enterprise Agreement (EA) before. It’s just a volume licensing deal for software, right? What’s the big deal? Well, a few years ago, a volume licensing program was just a better way to get bigger…
    - 18 hours ago Thursday, March 26, 2015 -
  • newUS lawmakers push for auctions of gov't spectrum
    A group of U.S. lawmakers has reintroduced legislation aimed at encouraging government agencies to give up their spectrum by allowing the agencies to share in the profits when the spectrum is auctioned to commercial mobile carriers.The Federal Spectr…
    - 18 hours ago Thursday, March 26, 2015 -
  • newBrandPost: Windows Server 2012: Optimize for Success

    BrandPost: Windows Server 2012: Optimize for Success

    Windows Server 2012 R2 gives users a lot of freedom in their work environments—the product answers the need for a good deal of flexibility, while realizing that simply connecting to a private cloud isn’t enough. Combining Windows Server 2012 and…
    - 18 hours ago Thursday, March 26, 2015 -
  • newBrandPost: What You Need to Know About Licensing for Windows Server 2012

    BrandPost: What You Need to Know About Licensing for Windows Server 2012

    In part one of our three-part look into Windows Server 2012, we took a deep dive into the new licensing options. Today, we’re going to closely examine what really sets the two licensing options—Standard or Datacenter—apart.Enterprise IT leaders…
    - 19 hours ago Thursday, March 26, 2015 -
  • newU.S. Government Requests for Yahoo User Data Drop
    Yahoo received nearly 5,000 requests for user data from the United States government in the last six months of 2014 and disclosed some content in nearly 25 percent of those cases. The company said in its new transparency report that it received betw…
    - 19 hours ago Thursday, March 26, 2015 -
  • newMicrosoft extends Azure Site Recovery

    Microsoft extends Azure Site Recovery

    As a further sign of its efforts to open up its platforms and support customers with mixed shops, Microsoft today updated Azure Site Recovery to allow it to be used with VMware virtual machines (VMs) and physical servers using Azure in addition to th…
    - 19 hours ago Thursday, March 26, 2015 -
  • newTech companies call on US to end bulk collection of metadata
    A slew of tech companies have joined privacy groups in calling for the U.S. government to reform its surveillance practices.An open letter from the tech industry and privacy organizations urges the government to not renew the provision in the Patriot…
    - 19 hours ago Thursday, March 26, 2015 -
  • newAmazon debuts bottomless storage plans for photos, data
    If you’ve got tons of digital photos and music that are a headache to back up, Amazon wants to interest you in two new storage services designed to ease home backups and archiving.The company’s new Unlimited Everything plan provides what promises…
    - 19 hours ago Thursday, March 26, 2015 -
  • newPayPal settles over WMD sanction-breaking transaction claims

    - 19 hours ago Thursday, March 26, 2015 -
  • newThreat Intelligence: A Force Multiplier for Security Pros
    With all of the threats and exploits that are discovered on a daily basis we, as security professionals, are always looking for an advantage.
    - 19 hours ago Thursday, March 26, 2015 -
  • newMobile storage about to balloon with new 3D flash chips from Intel and Micron
    Smartphones, tablets and PCs are about to get a whole lot more storage capacity thanks to new 3D flash chips from Intel and Micron that cram more bits into a smaller space.With the 3D NAND chips, which started shipping Thursday, solid-state drives wi…
    - 19 hours ago Thursday, March 26, 2015 -
  • newBig data brings big benefits, but don't overstep the privacy mark, warns panel

    Big data brings big benefits, but don't overstep the privacy mark, warns panel

    Organisations agree that there's limits to what you need to know about a customer
    - 19 hours ago Thursday, March 26, 2015 -
  • newGalaxy S6 price starts at $650 off-contract, 19% more for Edge

    Galaxy S6 price starts at $650 off-contract, 19% more for Edge

    U.S. wireless carriers today announced off-contract prices ranging from $650 to $685 for the new 32 GB Samsung Galaxy S6 smartphone and $100 to $129 more in premium pricing for its stylish cousin, the Edge, with both coming to buyers on April 10.[ Re…
    - 20 hours ago Thursday, March 26, 2015 -
  • newHow to reduce losses caused by theft at POS

    How to reduce losses caused by theft at POS

    Retail theft is a huge and costly problem for the industry. According to the “Global Retail Theft Barometer 2013-2014,” released by Checkpoint Systems in October 2014, total shrinkage among retailers in North America was $42 billion for the time…
    - 20 hours ago Thursday, March 26, 2015 -

SCADA/ Industrial Security

  • newThe evolving U.S. <b>cybersecurity</b> landscape: what firms want to know
    Do we have one designated person who truly understands our firm's cybersecurity infrastructure? A designated CISO who knows your industry, your ...
    - 1 hour ago Friday, March 27, 2015 -
  • newThe Active International Response to <b>Cyber</b> Crime
    The international cyber-security versus cyber-crime battle is gathering pace and what we're seeing is the formation of international alliances to fight ...
    - 13 hours ago Thursday, March 26, 2015 -
  • newGuest Opinion: UMass is a line of defense against <b>cyber</b> threats
    The increasing number of cyber-attacks on our digital infrastructure prompted President Obama to make cybersecurity a national priority, earmarking ...
    - 14 hours ago Thursday, March 26, 2015 -
  • newRole Of Hedge Funds Chief Technology Officer To Evolve
    “Additionally, as we see cybersecurity become a prominent issue, CTOs can manage security infrastructure and operations across the company to ...
    - 16 hours ago Thursday, March 26, 2015 -
  • newGovernment to host three day <b>cyber security</b> hackathon
    A three day hackathon to tackle cyber security issues is to take place in ... solutions to security issues facing businesses and infrastructure providers.
    - 18 hours ago Thursday, March 26, 2015 -
  • new<b>Cyber</b> strategy: 'We know what to do, now we need people to do it'
    Although federal cybersecurity officials say things look promising in defending against threats to critical infrastructure, they also warn the cyberworld's ...
    - 19 hours ago Thursday, March 26, 2015 -
  • newLatest report on Global aviation <b>cyber security</b> market will hit at CAGR of 5.94% between 2015-2019
    Cyber security solutions help organizations in the Aviation sector detect, monitor ... has given rise to sophisticated attacks on IT business infrastructure.
    - 22 hours ago Thursday, March 26, 2015 -
  • newGovernment brings together 50 talented young minds to tackle <b>cyber</b>-<b>security</b> issues
    ... will see participants working together on ideas designed to tackle the cybersecurity issues facing businesses and critical infrastructure providers.
    - 23 hours ago Thursday, March 26, 2015 -
  • newGovernment organises <b>cyber</b>-<b>security</b> hackathon
    ... of the brightest cyber-security students from leading universities tackle the critical security issues facing the businesses and national infrastructure ...
    - 23 hours ago Thursday, March 26, 2015 -
  • newFireEye CEO Dave DeWalt to Urge State Officials to Make <b>Cyber Security</b> a Top Priority
    ... Adaptive Defense(TM) model to supplement cyber security teams, strengthen critical infrastructure, and develop the necessary response capabilities ...
    - 24 hours ago Thursday, March 26, 2015 -
  • newDridex Reminds Us: You Can’t Prevent What You Can’t Detect

    Dridex Reminds Us: You Can’t Prevent What You Can’t Detect

    News this week of the Dridex malware campaign  (the newest member of the GameOver Zeus Trojan family) should serve as a reminder that you can’t stop what you can’t see. According to the research, the attack vectors remain the same as it ever was…
    - 2 days ago Wednesday, March 25, 2015 -
  • ICSage Video: Eireann Leverett on Catastronomics

    ICSage Video: Eireann Leverett on Catastronomics

    Eireann Leverett of the University of Cambridge Centre for Risk Studies looks at control system related catastrophe scenarios and the economic impact of these scenarios with an eye towards how insurance and reinsurance policies will be written and pr…
    - 7 days ago Friday, March 20, 2015 -
  • Unsolicited Response Podcast: SANS ICS 410 Course & GICSP

    Unsolicited Response Podcast: SANS ICS 410 Course & GICSP

    Episode 2015:2 SANS ICS Security Training and Certification SANS provided four individuals for our Unsolicited Response podcast on the 5-day ICS 410: ICS/SCADA Security Essentials training course and the related Global Industrial Cyber Security Profe…
    - 9 days ago Wednesday, March 18, 2015 -
  • Save The Date: S4xJapan is Nov 5-6 in Tokyo

    Save The Date: S4xJapan is Nov 5-6 in Tokyo

    Digital Bond is pleased to announce the 2nd edition of S4xJapan will be held on November 5 – 6 in Tokyo. The event will be in the Mori Building, Roppongi Hills. The Academy Hills facilities on the 49th floor were perfect for the event last year. Th…
    - 10 days ago Tuesday, March 17, 2015 -
  • Tool Release – CANBus Protector

    Tool Release – CANBus Protector

    Continuing in the line of CANBus research and tools release I’d like to announce some quick work on a proof-of-concept CANBus IPS called, unoriginally, the CANBus Protector. I took some time to work on defense of CAN after conducting a lot of vulne…
    - 10 days ago Tuesday, March 17, 2015 -
  • S4x15 CTF ICS Village Page

    S4x15 CTF ICS Village Page

    The Capture The Flag (CTF) contest in the ICS Village at S4x15 was a big hit. We have had numerous requests from attendees and those that heard about it for more information and data. So Stephen has put together a page of information. The page includ…
    - 11 days ago Monday, March 16, 2015 -
  • <b>Cyber security</b> market in the APAC region to grow at a CAGR of 15.15 % between year 2015 to 2020
    Cyber security solutions help organizations detect, monitor, report, and ... led an exponential rise in sophisticated attacks on IT business infrastructure. Organizations are increasingly adopting cyber security solutions to protect critical ...
    - 15 days ago Thursday, March 12, 2015 -
  • Call of Duty: Modern Ransomware

    Call of Duty: Modern Ransomware

    Not even an extra life can save gamers now. Bromium Labs has just published research that identifies a new strain of crypto-ransomware that locks many popular games, including Call of Duty, Minecraft and World of Warcraft. Bromium researchers first…
    - 15 days ago Thursday, March 12, 2015 -
  • US Industrial Control Systems Attacked 245 Times In 12 Months

    - 15 days ago Thursday, March 12, 2015 -
  • CSOs: Does this Network Admin Work at YOUR Company!?

    CSOs: Does this Network Admin Work at YOUR Company!?

    Information security is hard. Data breaches on the scale of Target, Home Depot, Sony and Anthem serve as a constant reminder that it is impossible to detect a determined attacker until it is too late. Bromium research has consistently found that the…
    - 16 days ago Wednesday, March 11, 2015 -
  • Kaspersky: ‘A very bad incident’ awaits critical infrastructure

    Kaspersky: ‘A very bad incident’ awaits critical infrastructure

    Cyber-terrorism attacks against power grids, water supply systems, chemical plants and other critical infrastructure loom as a threat that could become harsh reality before slow-moving agencies act to secure them better, says the head of Kaspersky La…
    - 17 days ago Tuesday, March 10, 2015 -
  • S4x15 Video: Ralph Langner or Cyber-Physical Attack Engineering

    S4x15 Video: Ralph Langner or Cyber-Physical Attack Engineering

    Ralph Langner presented at ICSage: ICS Cyber Weapons during S4x15 Week. As always Ralph is introducing new thoughts to push the industry forward, but this session is more on how to orient and organize the ICS communities’ thinking on attack / defen…
    - 17 days ago Tuesday, March 10, 2015 -
  • Is it time to FREAK out?

    Is it time to FREAK out?

    The security industry was whipped into a frenzy this week with the discovery of the FREAK vulnerability, which enables a determined attacker to downgrade SSL traffic from “strong” RSA encryption to “export-grade” RSA encryption. The vulnerabi…
    - 21 days ago Friday, March 6, 2015 -
  • The Hidden Costs of Security

    The Hidden Costs of Security

    I think we are all familiar with the obvious costs of poor security. Millions of dollars lost recovering from breaches, brand damage and etc. This is pretty much the conventional wisdom now days. Luckily my job includes speaking and interacting with…
    - 22 days ago Thursday, March 5, 2015 -
  • Tool Release – Digital Bond CANBus-Utils

    Tool Release – Digital Bond CANBus-Utils

    I’d like to make a quick post with the release of some CANBus analysis tools I wrote. The tools are written in javascript using nodejs, which comes preinstalled on the Beaglebone black — my hardware of choice when doing CAN analysis. I wrote up a…
    - 22 days ago Thursday, March 5, 2015 -
  • ISA99 – Safety and Security

    ISA99 – Safety and Security

    ISA99 Working Group 7 has a draft document out entitled “Recommendations to align safety and security for industrial automation control systems“. The document begins by noting the failed efforts to find a “mathematical coupling” between Safet…
    - 22 days ago Thursday, March 5, 2015 -
  • First Impression: GAO Report on FAA Security – The Sky is Not Falling

    First Impression: GAO Report on FAA Security – The Sky is Not Falling

    Yesterday, the Government Accountability Office (GAO) released “FAA Needs to Address Weaknesses in Air Traffic Control Systems,” a report that highlights the improvements the Federal Aviation Administration (FAA) needs to make to its critical air…
    - 24 days ago Tuesday, March 3, 2015 -
  • IIoT – What’s In A Name

    IIoT – What’s In A Name

    First in a series on IIoT, Industrial Internet and Industrie 4.0. I attended the ARC Forum last month in Orlando, and the theme was what ARC has coined as the Industrial Internet of Things (IIoT). Theme does not accurately describe the emphasis. Ever…
    - 24 days ago Tuesday, March 3, 2015 -
  • S4x15 Video: ICS Malware with Kyle Wilhoit

    S4x15 Video: ICS Malware with Kyle Wilhoit

    Kyle Wilhoit has found and analyzed a large portion of the ICS malware found in 2014 / 2015. He goes into the details of: – The Sandworm group looking for Internet exposed HMI and their targets – Blacken / Black Energy targeting the GE Cimplicity…
    - 25 days ago Monday, March 2, 2015 -
  • Russian Cyber Menace Threatens Industrial Systems

    - 25 days ago Monday, March 2, 2015 -
  • Wall Street Journal CIO Network Event: Old Thinking Won’t Fix New Problems

    Wall Street Journal CIO Network Event: Old Thinking Won’t Fix New Problems

    Earlier this month, the Wall Street Journal published a blog, “CIOs Name Their Top 5 Strategic Priorities,” which collected the recommendations from a variety of technical leaders at a CIO Network event. Author Steven Norton notes: While proposal…
    - 28 days ago Friday, February 27, 2015 -
  • When Zero Days Become Weeks or Months

    When Zero Days Become Weeks or Months

    As February comes to a close we have already seen critical patches from Adobe and Microsoft. Even more concerning, Microsoft has not yet patched a recently disclosed Internet Explorer zero-day. For better or worse, Google’s “Project Zero” is pu…
    - 30 days ago Wednesday, February 25, 2015 -
  • How ‘Power fingerprint’ could improve security for ICS/SCADA systems

    How ‘Power fingerprint’ could improve security for ICS/SCADA systems

    Most people have heard that one way law enforcement can figure out who might be growing marijuana in their basement is to monitor power consumption.If a small house is sucking up as much electricity as two or three similar houses in the neighborhood,…
    - 32 days ago Monday, February 23, 2015 -
  • Securing Obama’s “Internet Cathedral” – Who are its priests?

    Securing Obama’s “Internet Cathedral” – Who are its priests?

    At last week’s Cyber Security Summit at Stanford, President Obama sought to reset his administration’s relationship with a tech community alienated by an endless stream of disclosures of the government’s penetration of technology companies to…
    - 37 days ago Wednesday, February 18, 2015 -
  • Risky Clicks: End users cause the majority of security headaches

    Risky Clicks: End users cause the majority of security headaches

    In January 2015, Bromium conducted a survey of more than 100 information security professionals, focused on the greatest challenges and risks facing their organizations today. The results indicate that end users continue to remain the greatest sec…
    - 37 days ago Wednesday, February 18, 2015 -
  • Kaspersky SAS 2015 CablemeltingBAD
    Slides from Kaspersky SAS "SCADA in the cloud" talk. If you saw our 31C3 report you can start from the slide N36. Important quotesICS Cybersecurity definitiona process that ensures control object operation with no dangerous failures or damage, but w…
    - 38 days ago Tuesday, February 17, 2015 -
  • Siemens SIMATIC TIA Portal (Step 7/WinCC) fixes

    Siemens SIMATIC TIA Portal (Step 7/WinCC) fixes


    - 39 days ago Monday, February 16, 2015 -
  • Siemens Sighs: SCADA Bugs Abound

    - 50 days ago Thursday, February 5, 2015 -
  • The Vicious Cycle of “Assuming Compromise”

    The Vicious Cycle of “Assuming Compromise”

    When you walk the floors of industry trade shows and speak with security vendors, one of the most predominant endpoint security myths is “assume you will be compromised.” Of course, this is a fallacy, but as a result of this axiom, the security i…
    - 56 days ago Friday, January 30, 2015 -
  • Cyber-security: Changing the Economics!

    Cyber-security: Changing the Economics!

       The impact of recent cyber attacks will be felt for years to come, perhaps having risen to a new level of hurt with the Target and Sony attacks. With a Fortune 500 CEO ousted and a Hollywood movie held hostage, cyber-security is on the minds of…
    - 59 days ago Tuesday, January 27, 2015 -
  • Internet Attack Could Shut Down US Gas Stations

    - 63 days ago Thursday, January 22, 2015 -
  • Attackers Planting Banking Trojans In Industrial Systems

    - 73 days ago Tuesday, January 13, 2015 -
  • 31C3: Too Smart Grid in da Cloud ++

    31C3: Too Smart Grid in da Cloud ++

    This year we want to discuss Green Energy. Our hackers' vision of Green Energy, SmartGrids and Cloud IoT technology.  Our latest research was devoted to the analysis of the architecture and implementation of the most wide spread platforms for wind a…
    - 87 days ago Tuesday, December 30, 2014 -
  • SOS! Secure Open SmartGrids!

    SOS! Secure Open SmartGrids!

    Dear all,After our 31C3 Too SmartGrid in da Cloud talk we get many questions about Solar and Wind plants vulnerabilities, Internet connected SmartGrid devices. Guys, sorry, but we don’t know yet.There are dozens of platforms, hundreds of vendors,…
    - 89 days ago Sunday, December 28, 2014 -
  • South Korea Nuclear Plant Hit By Hacker

    - 94 days ago Tuesday, December 23, 2014 -
  • Hack Attack Causes Massive Damage At Steel Works

    - 95 days ago Monday, December 22, 2014 -
  • Chasing the White Whale: How Advanced Attacks Leverage Spear Phishing

    Chasing the White Whale: How Advanced Attacks Leverage Spear Phishing

    Update: Breaking News: ICANN targeted in a spear phishing attack Information security becomes increasingly important as the frequency of cyber attacks increases. From Target to Sony, the past 12 months have played host to the largest volume of attack…
    - Tuesday, December 16, 2014 -
  • Well, Honeywell

    Well, Honeywell

    New knowledge about Honeywell Experion Process Knowledge System. Yes, you must patch it.Yes, it's all about grep +1 SSRF.Thanks to Alexander Tlyapov, Gleb Gritsai, Kirill Nesterov, Artem Chaykin and Ilya KarpovHoneywell advisory/patch:https://www.h…
    - Tuesday, December 16, 2014 -
  • Picture This: Sony Hack Won’t Be the Last

    Picture This: Sony Hack Won’t Be the Last

    The FBI has warned US companies of a wave of destructive cyber attacks, in light of the recent Sony hack. I commented to eSecurityPlanet and SecurityWeek: “These attacks are troublesome, but not surprising. Earlier this year we witnessed Code Space…
    - Thursday, December 11, 2014 -
  • Siemens patches critical SCADA flaws likely exploited in recent attacks
    Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.One of the vulnerabi…
    - Monday, December 1, 2014 -
  • BootKit via SMS

    BootKit via SMS

    One of demo from PacSec and ZeroNights.Short FAQQ: Is it BadUSB?A: Not exactly, but kind of. Can be applied to any Android gadget. Q: Is it local or remote stuff?A: Can be done remotely (web/sms) for 4G/3G modemsQ: Any threats to ICS?A: YesQ: Huawei?…
    - Wednesday, November 19, 2014 -
  • Is it time to Fire your network protection vendor?

    Is it time to Fire your network protection vendor?

    I hereby solemnly promise that Bromium will never have a product with “fire” in its name.  By now every vendor in the  next-gen IDS / IPS / Firewall / honeypot-as-ultimate-defense-against-the-dark-arts market has a next-gen “fire”-branded p…
    - Monday, November 10, 2014 -
  • An Unprecedented Look At Stuxnet, The World's First Digital Weapon

    - Monday, November 3, 2014 -
  • Different type of SCADA...

    Different type of SCADA...

    +Update http://blog.ptsecurity.com/2015/01/hacking-atm-with-raspberry-pi.htmlSlides and demo from Olga and Alex report on ATM hacking at Black Hat. MS08-067 strikes again. Now ATM.There are a lot of different kinds of SCADA... Click Enjoy...
    - Wednesday, October 29, 2014 -
  • BlackEnergy Malware Has Compromised Systems For 2 Years

    - Wednesday, October 29, 2014 -
  • Attack of the malicious document – what was old is new again

    Attack of the malicious document – what was old is new again

    Recent zero day attacks targeting Windows using malicious Office documents should be a reminder to all of us that no attack vector ever truly dies, it just lurks in the background waiting for it’s time to come again. Malicious Office documents have…
    - Wednesday, October 22, 2014 -
  • Many Eyes Make Credible Security

    Many Eyes Make Credible Security

    We are proud to announce the successful results of an independent source-code review and penetration test of vSentry version 2.4 by the leading security consultancy  IOActive – acknowledged as one of the world’s leading security firms serv…
    - Tuesday, October 14, 2014 -
  • What is my encryption key?

    What is my encryption key?

    Update for update for WinCC <7.3. Now for Siemens SIMATIC PCS 7 <8.1.Details: https://ics-cert.us-cert.gov/advisories/ICSA-14-205-02A
    - Thursday, October 9, 2014 -
  • Why is Bromium InDemand?

    Why is Bromium InDemand?

    Recently LinkedIn recognized Bromium as one of the 10 most InDemand startups in the Bay Area. Thank you LinkedIn, and thank you Bay Area Tech Community! A number of folks, prospective and current co-workers, investors, customers, and friends have per…
    - Friday, October 3, 2014 -
  • Threat Intelligence firm mistakes research for nation-state attack

    Threat Intelligence firm mistakes research for nation-state attack

    [Updates to this story appear on page two.]On Tuesday, Bloomberg published a story based on honeypot scans, which was a follow-up to a previously published piece that explored the nature of attacks against industrial-control systems.Bloomberg's stori…
    - Wednesday, October 1, 2014 -
  • Rogue cell towers discovered in Washington, D.C.

    Rogue cell towers discovered in Washington, D.C.

    Towards the end of July, ESD America, the makers of the ultra-secure CryptoPhone, said that their engineers and customers had discovered more than a dozen rogue cell towers (also known as interceptors or IMSI catchers) around the U.S.New information…
    - Wednesday, September 17, 2014 -
  • Goldilocks and the 3 Theres

    Goldilocks and the 3 Theres

      At VMWorld VMware SVP of Security Tom Korn described the hypervisor and virtual network environment of a virtual infrastructure platform as the “Goldilocks Zone” for application security in the software defined data center.  He was right.  A…
    - Thursday, September 11, 2014 -
  • IDG Contributor Network: Tunnel vision: Train security as critical as planes and automobiles

    IDG Contributor Network: Tunnel vision: Train security as critical as planes and automobiles

    In recent weeks you’ve heard a lot of discussion around the cyber risks to aircraft and automobiles. After the Black Hat, DefCon and BSides conferences in Las Vegas, Nev., in July, it would seem that a great deal of necessary attention will be pai…
    - Monday, September 8, 2014 -
  • Next-Gen IDS/IPSs: Caught between a ROC and a hard place

    Next-Gen IDS/IPSs: Caught between a ROC and a hard place

    The market appears to have revisited its irrational exuberance about next-gen network IDS/IPSs, perhaps because every major security vendor has one (truth be told, throwing traffic at a set of cloud- or appliance-hosted sacrificial VMs isn’t rock…
    - Monday, September 8, 2014 -
  • Black Hat Survey: End Users Remain Biggest Security Headache as Compromised Endpoints Increase

    Black Hat Survey: End Users Remain Biggest Security Headache as Compromised Endpoints Increase

    Earlier this year, Bromium published “Endpoint Protection: Attitudes and Opinions,” a statistical analysis of more than 300 information security professionals. The results revealed that endpoints are vulnerable, anti-virus is ineffective and end…
    - Wednesday, September 3, 2014 -
  • Industrial software website used in watering hole attack

    Industrial software website used in watering hole attack

    AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.The criminals responsible for the incident compromised an unnamed industrial software firm's website, suggesti…
    - Tuesday, September 2, 2014 -
  • Few bugs in Wonderware Information Server

    Few bugs in Wonderware Information Server

    Vulnerabilities/fixes in Schneider Electric/Invensys Wonderware Information Server (WIS) to support tradition.The following Schneider Electric WIS versions are affected:Wonderware Information Server 4.0 SP1 Portal,Wonderware Information Server 4.5 Po…
    - Monday, September 1, 2014 -
  • Not by SCADA alone: ATM hack @BH Europe

    Not by SCADA alone: ATM hack @BH Europe

    Alexey and Olga gonna speak @BlackHat 2014 EU on ATM security.Please be careful there!Hint
    - Monday, September 1, 2014 -
  • How a hacker could cause chaos on city streets

    How a hacker could cause chaos on city streets

    Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.That Hollywood scenario is what researchers at the University of Michigan proved could happen given the security…
    - Friday, August 29, 2014 -
  • Workers at U.S. nuclear regulator fooled by phishers

    Workers at U.S. nuclear regulator fooled by phishers

    Nuclear Regulatory Commission employees were tricked into disclosing passwords and downloading malware in three phishing attacks that occurred over a three-year period.The incidents were described in an inspector general report obtained by the public…
    - Tuesday, August 19, 2014 -
  • The Rise and Fall of Enterprise Security

    The Rise and Fall of Enterprise Security

    Every day, enterprises are bombarded by rapidly multiplying and morphing advanced threats—and current network and endpoint security solutions aren’t capable of defeating these targeted attacks. This year a major IT analyst wrote: “Advanced targ…
    - Thursday, August 14, 2014 -
  • IDG Contributor Network: Buckle up: Security threats to connected cars get real

    IDG Contributor Network: Buckle up:  Security threats to connected cars get real

    As our connected cars move from syncing our music to driving us home, drivers, passengers, and pedestrians are starting to wonder if they should trust these high-velocity death-mobiles with their lives.  It’s a good question.Tesla, one of the lea…
    - Tuesday, August 12, 2014 -
  • NIST Wants Better SCADA Security

    - Tuesday, August 12, 2014 -
  • In praise of seamless, small-footprint, light-weight, transparent endpoint security

    In praise of seamless, small-footprint, light-weight, transparent endpoint security

    In a recent blog, Rick Holland of Forrester Research takes aim at meaningless vendor epithets, such as “light-weight”, “non-invasive” and “small-footprint” used to describe their endpoint security products.  As he astutely observes, what…
    - Monday, July 28, 2014 -
  • Siemens SIMATIC WinCC 7.3: Vulnerabilities/Fixes

    Siemens SIMATIC WinCC 7.3: Vulnerabilities/Fixes

    New version of WinCC/new features/new advisories/new vulnerabilities. Kudos Gleb Gritsai, Dmitry Nagibin and Alexander Tlyapov .CVE-2014-4682/HTTP/sensitive data (session) leakage CVE-2014-4683/HTTP/remote privileges escalation (useful with CVE-2014-…
    - Wednesday, July 23, 2014 -
  • Microvisor + Hypervisor Makes Your VMs Secure by Design

    Microvisor + Hypervisor Makes Your VMs Secure by Design

    I often get asked whether micro-virtualization can be used with a traditional hypervisor and full-OS “fat” VMs (humor: FAT VMs are another matter). YES! There are powerful benefits in both client and server scenarios. I’ll focus on the user cen…
    - Wednesday, July 16, 2014 -
  • How do you spell “Polymorphic”?

    How do you spell “Polymorphic”?

    I guess the answer is “i r o n y”:  Last week a Bromium field employee searched for “polymorphic” on dictionary.com and was treated to a gloriously literal definition: The site dropped a banking Trojan! Although the user was unaware of th…
    - Tuesday, July 15, 2014 -
  • Detectible Dysfunction

    Detectible Dysfunction

    In 2003, security industry analyst Richard Stiennon famously declared that intrusion detection systems would be obsolete by 2005, writing at the time: “The underlying problem with IDS is that enterprises are investing in technology to detect intrus…
    - Thursday, July 10, 2014 -
  • If you had only one more security dollar…

    If you had only one more security dollar…

    what would you spend it on?   Improve endpoint security, or better protect your network or your applications? This was the topic debated by three Gartner security analysts: Neil MacDonald (endpoint), Greg Young (network) and Joseph Feiman (applicati…
    - Tuesday, July 8, 2014 -
  • New Resource Page for the latest on Havex / Dragonfly / Energetic Bear Campaign
    Get the latest on the current ICS cyber threat intelligence related to the Dragonfly / Energetic Bear campaign and the use of the Havex exploit, including new vectors exploiting trusted supplier software troganization.
    - Thursday, July 3, 2014 -
  • The Dawn Of A New Era In Corporate Cyber Threats?

    The Dawn Of A New Era In Corporate Cyber Threats?

      Cyber criminals know where the money is and have been attacking businesses in the hopes of getting a big payout for many years. Hacking and manipulating financial systems to steal money or customer credit and banking information to sell on the bla…
    - Tuesday, July 1, 2014 -
  • Energy Firms Hacked By Dragonfly Group

    - Tuesday, July 1, 2014 -
  • SCADA/ICS Systems Under Attack In Europe Stuxnet-Style

    - Thursday, June 26, 2014 -
  • Chrome Perfected (2/2): Protect Users and Sites on the Web

    Chrome Perfected (2/2): Protect Users and Sites on the Web

    In a previous post I described how Bromium makes Chrome fast and massively secure.   vSentry will always protect the endpoint from an attack via the browser – and the attack will be automatically remediated. But the browser itself manages valua…
    - Wednesday, June 25, 2014 -
  • Open Source Security in a Post-Heart Bleed World
    Join SCADAhacker and McAfee for the next Twitter #SecChat on "Open Source Security in a Post-Heart Bleed World" Thursday, June 26 from 11am-12pm PST. Details and RSVP available here. The June #SecChat will address current issues surrounding OpenSS…
    - Wednesday, June 25, 2014 -
  • Special Discount for Upcoming ICS Advanced Cyber Security Training
    Hurry and register for the next advanced cyber security training course "Understanding, Assessing and Security Industrial Control Systems" to be held August 11-15 at Lambeau Field, Green Bay. This will be an exciting week, as the famous Green Bay P…
    - Wednesday, June 25, 2014 -
  • Kali Linux Mirrors added to SCADAhacker
    Mirrors for Kali Linux 1.0.7 have been added to the Tools page. Authenticity can be validated by comparing the appropriate SHA1 hash value with those from the Kali website (kali.org).
    - Wednesday, June 25, 2014 -
  • New Tools Coming Soon to SCADAhacker!
    In addition to updated information regarding upcoming training and related cyber events on the Home page, details have been placed on the Tools page regarding the addition of some new how-to guides.
    - Tuesday, June 24, 2014 -
  • Videos Now Available from KIACS 2014 in Kuwait
    All of the videos from the successful Kuwait Industrial Automation Cyber Security (KIACS) 2014 Conference in Kuwait City has been added to the Event Archives on the Home page.
    - Tuesday, June 24, 2014 -
  • Culture clash: How physical security is impacted by cultural norms

    Culture clash: How physical security is impacted by cultural norms

    Physical perimeter security can differ from facility to facility, with myriad factors playing into what exactly is implemented, including budget and the assets that are being protected.But what about geographical location and, subsequently, culture?I…
    - Monday, June 23, 2014 -

IT News

  • newYou can now test DirectX 12 yourself with latest 3DMark update

    You can now test DirectX 12 yourself with latest 3DMark update

    The impending launch of DirectX 12 is one of the more exciting things to happen in PC gaming in recent years. Many people are eager to see how the low level API will improve the performance of games that implement it, especially on systems with power…
    - 44 mins ago Friday, March 27, 2015 -
  • newCopyright Bots Kill App Over 'Potentially Infringing' Images, Follow This Up By Blocking App For Use Of CC/Public Domain Images

    Copyright Bots Kill App Over 'Potentially Infringing' Images, Follow This Up By Blocking App For Use Of CC/Public Domain Images

    With bots performing all sorts of intellectual property policing these days, fair use considerations are completely off the table. Nuances that can't be handled by a bot should theoretically be turned over to a human being in disputed cases. Unfortun…
    - 52 mins ago Friday, March 27, 2015 -
  • newTinder hack tricks men into unknowingly flirting with each other
    In yet another example of how very hackable Tinder is, an engineer set up bait female profiles and then hooked up the guys who "liked" them.
    - 1 hour ago Friday, March 27, 2015 -
  • newFinancial Conduct Authority Update March 2015
    The UK's Financial Conduct Authority (FCA) is becoming more proactive in the online application space.Following last year's consultation on use of social media, the FCA has completed its review and has now confirmed its approach for financ...
    - 3 hours ago Friday, March 27, 2015 -
  • newGood News: Internet Ad Industry Realizes It Needs To Embrace HTTPS

    Good News: Internet Ad Industry Realizes It Needs To Embrace HTTPS

    About a year ago, when we switched to default HTTPS, we pointed out that one of the major reasons why other news sites refused to do the same was that most ad networks would not support HTTPS. In fact, we had to end a number of relationships with ad…
    - 4 hours ago Friday, March 27, 2015 -
  • newLiving without cable: My experience with cutting the cord

    Living without cable: My experience with cutting the cord

    It’s been a month since I disconnected my AT&T U-verse TV service. It's not the first time, but something I’ve done half a dozen times over the last several years. What’s different about this time and why I’m compelled to write about it is th…
    - 6 hours ago Friday, March 27, 2015 -
  • newOpenSAMM Benchmarking Improvement!

    OpenSAMM Benchmarking Improvement!

    The power of comparison for identifying gaps & prioritizing solutions. OpenSAMM (Open Software Assurance Maturity Model) is great as a framework for assessing the current state of security integration into your SDLC—providing visibility into the ga…
    - 7 hours ago Friday, March 27, 2015 -
  • newLet's Do Business: How Lifting The Embargo Has Opened The Door For Cuban Trademark Suits

    Let's Do Business: How Lifting The Embargo Has Opened The Door For Cuban Trademark Suits

    I'll miss the Cuban embargo. The easing of relations that it brings with it will likely mean the end of the 1950s-style spy games and crazy plots -- like the CIA plot designed to make a leader's beard fall out. Instead, we've finally decided that the…
    - 8 hours ago Thursday, March 26, 2015 -
  • newPotential Consequences of Hacking Tutorials on the Web

    Potential Consequences of Hacking Tutorials on the Web

    When I was about 10 years old, I read a book about Kevin Mitnick, Pengo and Robert Morris. While their exploits seemed very interesting, each story ended in jail time or at the very least, derailment of career goals. My unsophisticated Internet searc…
    - 8 hours ago Thursday, March 26, 2015 -
  • newTop 4 Cloud Findings – Cloud and Big Data Insider Threat Report
    We just this week issued the Cloud and Big Data edition of the 2015 Vormetric Insider Threat Report.  In this edition we concentrated on the results relating directly to cloud and big data environments, and there were some real eye openers once we g…
    - 9 hours ago Thursday, March 26, 2015 -
  • newSBN Sponsor Post

    - 10 hours ago Thursday, March 26, 2015 -
  • newDailyDirt: Flying With The Greatest Of Ease

    DailyDirt: Flying With The Greatest Of Ease

    Airplanes have been commonplace for quite some time now, and we've grown accustomed to what an airplane should look like. Ask any kid to draw a plane, and you'll probably get familiar results. However, this doesn't mean we've reached the end of novel…
    - 12 hours ago Thursday, March 26, 2015 -
  • newTwitter launches Periscope, thanks Meerkat for building hype around live streaming video

    Twitter launches Periscope, thanks Meerkat for building hype around live streaming video

    Periscope, Twitter’s answer to live video streaming app Meerkat, is now available to all and based on early feedback, the service feels way more “complete” than the competition. Of course, that’s to be expected considering Twitter recently ac…
    - 12 hours ago Thursday, March 26, 2015 -
  • newOVERNIGHT CYBERSECURITY: House Intel approves cyber bill
    Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We're here to connect the dots as leaders in government, policy and industry wrap their arms around cyberthreats. What lies ahead...
    - 13 hours ago Thursday, March 26, 2015 -
  • newCalifornia Legislators Pushing Warrant Requirement For All Access To Electronic Information, Including That Obtained By Stingrays

    California Legislators Pushing Warrant Requirement For All Access To Electronic Information, Including That Obtained By Stingrays

    Good news from California: a bill requiring warrants for Stingray device usage (among other things) has passed out of a Senate committee and is headed for an assembly vote. Among other sweeping new requirements to enhance digital privacy, the bill n…
    - 13 hours ago Thursday, March 26, 2015 -
  • newAmazon is looking for the best robot designs to run its warehouses

    Amazon is looking for the best robot designs to run its warehouses

    Amazon has been relying on automated robots in its warehouse and packing facilities alongside human workers for some time. These bots are still unable to handle all of the tasks needed and it looks as though Amazon is looking to upgrade the fleet.
    - 13 hours ago Thursday, March 26, 2015 -
  • newMessage to Errata employees
    Dear employees,Starting next week, Errata Security will be following RSA Conference's lead and institute a "Morality Dress Code" in order to deal with the problem of loose women on the premises.Attire of an overly revealing or suggestive nature is no…
    - 14 hours ago Thursday, March 26, 2015 -
  • newLost in Translation…in Italy

    Lost in Translation…in Italy

    I’ve been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on…
    - 14 hours ago Thursday, March 26, 2015 -
  • newDangerously Underpowered NSA Begging Legislators For Permission To Go To Cyberwar

    Dangerously Underpowered NSA Begging Legislators For Permission To Go To Cyberwar

    Cyber-this and cyber-that. That's all the government wants to talk about. The NSA, which has always yearned for a larger slice of the cybersecurity pie, is pushing legislators to grant it permission to go all-out on the offensive to protect foreign-o…
    - 14 hours ago Thursday, March 26, 2015 -
  • newLG G Watch Urbane with LTE launching in local markets soon for nearly $600

    LG G Watch Urbane with LTE launching in local markets soon for nearly $600

    LG attracted the attention of many last month with the unveiling of its LG G Watch Urbane. Based on what we’ve seen thus far, this smartwatch looks every bit as stylish as a traditional timepiece but includes the internals of LG’s earlier G Watch…
    - 14 hours ago Thursday, March 26, 2015 -
  • new“Look at me” – forget fingerprints, here comes a Samsung tablet with iris recognition
    US research institute SRI has inked a deal with Samsung to build a tablet with built-in iris recognition.Samsung's S5 fingerprint reader was cracked PDQ...wonder how long your eye-prints will hold up?
    - 15 hours ago Thursday, March 26, 2015 -
  • newCISO Insights: How the CISO of San Diego Secures His City
    This article is the first in a series of interviews with CISOs in various industries. Our goal is to share our conversations with different Chief Information Security Officers about how they deal with daily tasks as well as the bigger picture of inno…
    - 15 hours ago Thursday, March 26, 2015 -
  • newFree Speech, Censorship, Moderation And Community: The Copia Discussion

    Free Speech, Censorship, Moderation And Community: The Copia Discussion

    As I noted earlier this week, at the launch of the Copia Institute a couple of weeks ago, we had a bunch of really fascinating discussions. I've already posted the opening video and explained some of the philosophy behind this effort, and today I wan…
    - 15 hours ago Thursday, March 26, 2015 -
  • newSling TV core package now includes 20 channels for $20

    Sling TV core package now includes 20 channels for $20

    Over-the-top Internet television provider Sling TV has added a handful of channels to its offering, boosting its “Best of Live TV” core package of channels to 20 for $20 per month.
    - 15 hours ago Thursday, March 26, 2015 -
  • newBerta CMS File Upload Bypass
    Berta CMS versions prior to 0.8.10b suffer from an issues where images with a ".php" extension can be uploaded and all that is required is that they pass the PHP getimagesize() function and have suitable dimensions.
    - 16 hours ago Thursday, March 26, 2015 -
  • newRed Hat Security Advisory 2015-0729-01
    Red Hat Security Advisory 2015-0729-01 - The setroubleshoot packages provide tools to help diagnose SELinux problems. When Access Vector Cache messages are returned, an alert can be generated that provides information about the problem and helps to t…
    - 16 hours ago Thursday, March 26, 2015 -
  • newRed Hat Security Advisory 2015-0726-01
    Red Hat Security Advisory 2015-0726-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memo…
    - 16 hours ago Thursday, March 26, 2015 -
  • newRed Hat Security Advisory 2015-0728-01
    Red Hat Security Advisory 2015-0728-01 - Red Hat Identity Management is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. It integrates components of the Red Ha…
    - 16 hours ago Thursday, March 26, 2015 -
  • newRed Hat Security Advisory 2015-0727-01
    Red Hat Security Advisory 2015-0727-01 - The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering m…
    - 16 hours ago Thursday, March 26, 2015 -
  • newThink your password is strong? Guess again
    The next time a password strength meter grades your security code as “very strong,” you might want to think again. Researchers at Concordia University in Montreal found that major Internet service providers give high marks to basic and easily...
    - 16 hours ago Thursday, March 26, 2015 -
  • newNew York Legislators Seeking A 'Right To Repair' Law For Electronic Devices

    New York Legislators Seeking A 'Right To Repair' Law For Electronic Devices

    Well, this is (potentially) good news. New York is going forward with the first "right to repair" bill in the nation, as pointed out on Twitter by Amanda Levendowski. The bill will allow constituents to bypass manufacturer-authorized dealers/repair c…
    - 16 hours ago Thursday, March 26, 2015 -
  • newUN creates digital privacy watchdog
    The top human rights body in the United Nations has voted to create a special watchdog dedicated to the right to privacy in the digital age.The new "Special Rapporteur" created by the Human Rights Council on Thursday will be tasked with...
    - 16 hours ago Thursday, March 26, 2015 -
  • newDaily Deals: Cyber Security Developer Course Bundle

    Daily Deals: Cyber Security Developer Course Bundle

    Today's Daily Deal focuses on 88% off of the Cyber Security Developer Course Bundle. For $49, you get 60 hours of training through 6 separate courses on subjects ranging from secure PHP coding to learning all about VPNs to training to take the CISA c…
    - 16 hours ago Thursday, March 26, 2015 -
  • newSamsung Galaxy S6 / S6 Edge pre-orders open tomorrow, here's everything you need to know

    Samsung Galaxy S6 / S6 Edge pre-orders open tomorrow, here's everything you need to know

    Samsung has confirmed that its next flagship smartphone will launch in the US on April 10. Those interested in either the Galaxy S6 or Galaxy S6 Edge can get their pre-orders in starting tomorrow, March 27, through AT&T, Sprint, T-Mobile, Verizon and…
    - 16 hours ago Thursday, March 26, 2015 -
  • newFeds offer $3M reward for alleged cyber crooks
    The government is pumping up financial incentives for people to help get cyber criminals in front of U.S. judges.The State Department on Thursday revealed two rewards totaling up to $3 million for information on two alleged cyber crooks, Roman...
    - 17 hours ago Thursday, March 26, 2015 -
  • newBill Introduced To Repeal Patriot Act And Prevent The Government From Demanding Encryption Backdoors

    Bill Introduced To Repeal Patriot Act And Prevent The Government From Demanding Encryption Backdoors

    Since the Snowden leaks began, there have been several efforts made -- legislative and administrative -- in response to the exposure of the NSA's domestic surveillance programs. Some have been real fixes. Some have been fake fixes. Others have target…
    - 17 hours ago Thursday, March 26, 2015 -
  • newHalo returns to PC as Russia-exclusive free-to-play game

    Halo returns to PC as Russia-exclusive free-to-play game

    The Halo series has finally returned to PC, although probably not in the way most PC gamers would hope. 343 Industries, developer of the most recent Halo games for Xbox, has announced Halo Online as a free-to-play online multiplayer game, but unfortu…
    - 17 hours ago Thursday, March 26, 2015 -
  • newUS takes Chinese cyber rule frustration to WTO
    The U.S. is taking its concern over China’s looming cybersecurity regulations to the World Trade Organization (WTO), Reuters reported.The Obama administration has argued the rules could lock out foreign companies.In a document published Thursday,..…
    - 18 hours ago Thursday, March 26, 2015 -
  • newHello #Barbie spies on kids: talks, records, sends conversations to company's server #privacy http://t.co/Ew84Uw4EHk
    21 retweets 6 favorites
    - 18 hours ago Thursday, March 26, 2015 -
  • newCyberNadir: Former Pilot Randomly Speculates (Incorrectly) That Recent Airbus Crash Could Be The Work Of Hackers

    CyberNadir: Former Pilot Randomly Speculates (Incorrectly) That Recent Airbus Crash Could Be The Work Of Hackers

    CNN and Fox had the market cornered on ridiculous airplane crash theories, up until recently. When Malaysia Airlines Flight 17 just up and vanished, CNN produced wall-to-wall coverage seemingly cribbed from low-rent conspiracy theory sites. UFO? Blac…
    - 18 hours ago Thursday, March 26, 2015 -

Youtube News - CyberSecurity

The Global Cybersecurity Market 2014 2024 Country Analysis Market Profile
Big market research, Add a report Cybersecurity Market,Sizes,Analysis,Growths,Challenges,2014-2024 To Get Complete Report Here ...
- 2 hours ago Friday, March 27, 2015 -
2015 CTO Forum Rethinking Cyber Security Strategy Matthew Rosenquist
Matthew Rosenquist, Cybersecurity Strategist for Intel, discusses the rethinking of cybersecurity for the CTO Forum audience. The technology industry must change in order to meet cybersecurity...
- 4 hours ago Friday, March 27, 2015 -
Obama brings tech firms into his cybersecurity push

- 12 hours ago Thursday, March 26, 2015 -
Obama renews push for cybersecurity law

- 12 hours ago Thursday, March 26, 2015 -
What Will You Learn in Cybersecurity at Bay Path
description.
- 16 hours ago Thursday, March 26, 2015 -
Cybersecurity - Master of Science in Law
Maryland is the epicenter of cybersecurity; the home of the National Security Administration (NSA), the U.S. Cyber Command, dozens of cybersecurity firms—in short, a thriving constellation...
- 20 hours ago Thursday, March 26, 2015 -
Why Cybersecurity at Bay Path University?
description.
- 23 hours ago Thursday, March 26, 2015 -
Cybersecurity at Bay Path University
description.
- 23 hours ago Thursday, March 26, 2015 -
Why everything you have been told about Cybersecurity ....is wrong
The cyber criminals are becoming more brazen, they are targeting small and medium business and not for profit organisations in record numbers. The problem is that SME's fail to recognize...
- 1 day ago Wednesday, March 25, 2015 -
GRC05 Overview and Analysis of NIST Cybersecurity Framework Sarah Ackerman
These are the videos from Central Ohio Infosec 2015: http://www.irongeek.com/i.php?page=videos/centralohioinfosec2015/mainlist.
- 1 day ago Wednesday, March 25, 2015 -
Executive12 Building An Industrial Controls Cybersecurity Framework Critical Infrastructure Ernie Ha
These are the videos from Central Ohio Infosec 2015: http://www.irongeek.com/i.php?page=videos/centralohioinfosec2015/mainlist.
- 1 day ago Wednesday, March 25, 2015 -
Counterterrorism and Cybersecurity: Total Information Awareness (2nd Edition)
Amazon: http://goo.gl/xBCbls Barnes & Noble: http://goo.gl/LE3cWh From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines ...
- 2 days ago Wednesday, March 25, 2015 -

InfoSec Podcasts

  • newISC StormCast for Friday, March 27th 2015
    ANTLabs InnGate Unauthenticated rsync server http://blog.cylance.com//spear-team-cve-2015-0932Samsung Going to Offer Iris Scanning in Future Mobile Devices http://www.sri.com/newsroom/press-releases/sri-international-offer-iris-biometric-embedded-pro…
    - 9 hours ago Thursday, March 26, 2015 -
  • newRisky Business #359 -- Whisper? More like shout!
    This week Risky Business takes you behind the scenes of a spat between the makers of the Whisper App and Stephen Ridley's company Xipiter.Ridley's crew say they found some 24-carat-facepalm security problems with the app, subsequently publishing a b…
    - 1 day ago Thursday, March 26, 2015 -
  • newISC StormCast for Thursday, March 26th 2015
    Certificate Pinninghttps://isc.sans.edu/forums/diary/Pinup+on+your+Smartphone/19513/Elastichoneyhttp://jordan-wright.github.io/blog/2015/03/23/introducing-elastichoney-an-elasticsearch-honeypot/Android Installer Vulnerability Can Lead to Installing U…
    - 1 day ago Wednesday, March 25, 2015 -
  • newChet Chat 191 - March 25, 2015
    Join Sophos experts Chester Wisniewski and Paul Ducklin for the latest episode of our computer security podcast.This week's Chet Chat comes to you from an al fresco café in downtown Ljubljana, as Chester gets ready to present at a conference in Sl…
    - 2 days ago Wednesday, March 25, 2015 -
  • newISC StormCast for Wednesday, March 25th 2015
    Repurposing Logshttps://isc.sans.edu/forums/diary/Repurposing+Logs/19503/Old Vulnerable Flash Applets Still Deployed And Need to be Recompiledhttp://blog.nibblesec.org/2015/03/the-old-is-new-again-cve-2011-2461-is.htmlWind Turbine Web Admin Vulnerabi…
    - 2 days ago Tuesday, March 24, 2015 -
  • ISC StormCast for Tuesday, March 24th 2015
    Cisco IP Phones Vunerable To Evesdroppinghttp://tools.cisco.com/security/center/viewAlert.x?alertId=37946http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-opensslPOSeidon Point of Sales Malwarehttp://blogs.cisco.c…
    - 3 days ago Monday, March 23, 2015 -
  • DtSR Episode 135 - NewsCast for March 23rd, 2015
    Remember folks, as you listen reach out to us on Twitter and hit the hashtag #DtSR to continue the conversation, and speak your mind! Let's hear what your take is on the stories we discuss...maybe you have a unique angle we've not considered?In this…
    - 4 days ago Monday, March 23, 2015 -
  • ISC StormCast for Monday, March 23rd 2015
    Cansec West: Pwn20wn demonstrates vulnerabilities in all tested browsers http://www.theregister.co.uk/2015/03/21/thats_cloud_security_up_the_spout_all_browsers_pwned_in_minutes/Cansec West: BIOS Attacks https://threatpost.com/new-bios-implant-vulnera…
    - 4 days ago Sunday, March 22, 2015 -
  • ISC StormCast for Friday, March 20th 2015
    OpenSSL Patchhttps://isc.sans.edu/forums/diary/OpenSSL+Patch+Released/19485/Who Develops Code for IT Support Scareware Websiteshttps://isc.sans.edu/forums/diary/Who+Develops+Code+for+IT+Support+Scareware+Websites/19489/Apple Yosemite Updatehttps://su…
    - 7 days ago Thursday, March 19, 2015 -
  • Risky Business #358 -- HD Moore and Haroon Meer play "king for a day"
    On this week's show we chat with Rapid7's HD Moore (feature) and Thinkst head honcho Haroon Meer (sponsor) about the big-picture changes that could see enterprise security actually change. They're both high-level interviews with two of the industry's…
    - 8 days ago Thursday, March 19, 2015 -
  • ISC StormCast for Thursday, March 19th 2015
    Invisible iOS Apps http://www.zdziarski.com/blog/?p=5072 D-Link Patches http://www.kb.cert.org/vuls/id/377348 Premara Blue Cross Audit Report http://www.opm.gov/our-inspector-general/reports/2014/audit-of-inoformation-systems-general-and-application-…
    - 8 days ago Wednesday, March 18, 2015 -
  • ISC StormCast for Wednesday, March 18th 2015
    Fake Live.fi Certificate Revoked By Special Microsoft Update https://technet.microsoft.com/en-us/library/security/3046310?f=255&MSPPError=-2147217396Apple Releases Safari 8.0.4 https://support.apple.com/en-us/HT204560TLS Server Scan Reveals Repeated…
    - 9 days ago Tuesday, March 17, 2015 -
  • Chet Chat 190 - March 18, 2015
    Join Sophos security experts Chester Wisniewski and Paul Ducklin for the latest episode of our weekly podcast.This week's edition comes to you straight from the Sophos exhibition booth at the CeBIT show in Hannover Germany!
    - 10 days ago Tuesday, March 17, 2015 -
  • ISC StormCast for Tuesday, March 17th 2015
    OpenSSL Patch Pre-Announcmenthttps://mta.openssl.org/pipermail/openssl-announce/2015-March/000020.htmlYahoo Trying Out "On Demand Passwords"http://yahoo.tumblr.com/post/113708272894/a-new-simple-way-to-log-inOld Safari Private Browsing Bug Still Not…
    - 10 days ago Monday, March 16, 2015 -
  • Episode 156 - Sad Panda
    Episode 156 - Sad Panda Martin, Steve, and Joseph got on tonight to talk about clickbait-that-wasn't, AV eating itself, and 6 ways the Sony breach didn't actually change everything. A great slideshow article from friend of the podcast Michael Santarc…
    - 10 days ago Monday, March 16, 2015 -
  • DtSR Episode 134 - Fundamental Security
    In this episode...Michael C and the team talk bout "going back to basics" and the need for security fundamentalsMichael C talks a little about why we (security professionals) fail at fixing problems at scaleWe dive into the need for automation, an…
    - 11 days ago Monday, March 16, 2015 -
  • ISC StormCast for Monday, March 16th 2015
    Virtual MAchine Detection in VBA https://isc.sans.edu/forums/diary/Maldoc+VBA+SandboxVirtualization+Detection/19465/Yahoo End-to-End E-mail Encryption Plugin http://yahoo.tumblr.com/post/113708033335/user-focused-security-end-to-end-encryptionWindows…
    - 11 days ago Sunday, March 15, 2015 -
  • ISC StormCast for Friday, March 13th 2015
    Blind SQL Injection Against WordPress SEO By Yoasthttps://isc.sans.edu/forums/diary/Blind+SQL+Injection+against+WordPress+SEO+by+Yoast/19457/Adobe Flash Player Updatehttps://helpx.adobe.com/security/products/flash-player/apsb15-05.htmlBlackberry Advi…
    - 14 days ago Thursday, March 12, 2015 -
  • Chet Chat 189 - March 11, 2015
    Join Sophos experts Chester Wisniewski and Paul Ducklin for our weekly security podcast.In this episode: FREAK, Update Tuesday, hypervisor escape, spammers, hackers, foistware...and the Chet Chat's 5th birthday!
    - 15 days ago Thursday, March 12, 2015 -
  • Risky Business #357 -- Mark Dowd talks Rowhammer
    On this week's show we're having a chat with Mark Dowd about the so-called Rowhammer exploit. And yeah, if you haven't heard about this one you're in for a treat. It's among the most badass research I've ever seen. You know, you can skin a cat with a…
    - 15 days ago Wednesday, March 11, 2015 -
  • ISC StormCast for Thursday, March 12th 2015
    Syslog Skeet Shooting: Targetting Real Problems in Event Logshttps://isc.sans.edu/forums/diary/Syslog+Skeet+Shooting+Targetting+Real+Problems+in+Event+Logs/19449/Panda Virus Labels Itself as Malwarehttp://www.pandasecurity.com/uk/homeusers/support/ca…
    - 15 days ago Wednesday, March 11, 2015 -
  • ISC StormCast for Wednesday, March 11th 2015
    Microsoft Patch Tuesdayhttps://isc.sans.edu/forums/diary/Microsoft+March+Patch+Tuesday/19445/Threatglasshttps://isc.sans.edu/forums/diary/Threatglass+has+pcap+files+with+exploit+kit+activity/19433/
    - 16 days ago Tuesday, March 10, 2015 -
  • ISC StormCast for Tuesday, March 10th 2015
    Apple Security Updateshttps://support.apple.com/en-us/HT1222Google Exploits "Rowhammer"http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.htmlseagate Confirms NAS Code Execution Flawhttp://knowledge.seagate.com/articl…
    - 17 days ago Monday, March 9, 2015 -
  • Episode 155 - Terrible Tactics
    The Show Notes Opening Music BSides AtlantaSFS Podcast is a sponsorMartin is presenting “The Art of Speaking with Muggles”Sold out but sponsors have tix they are handing out. Also Eventbrite courtesy. Stories: It’s hard to…
    - 17 days ago Monday, March 9, 2015 -
  • DtSR Episode 133 - NewsCast for March 9th, 2015
    In this episode--Law firm hit and crippled by ransomware, decides it's not paying the ransom.They aren't quite sure what got encryptedBut they have backups.....and data was likely not exfiltratedhttp://news.softpedia.com/news/Ransomware-Hits-Law…
    - 18 days ago Monday, March 9, 2015 -
  • ISC StormCast for Monday, March 9th 2015
    Cryptowall Uses .chm File To Probagatehttps://isc.sans.edu/forums/diary/Cryptowall+again/19427/How Malware Generates Mutex Names to Evade Detectionhttps://isc.sans.edu/forums/diary/How+Malware+Generates+Mutex+Names+to+Evade+Detection/19429/New Skype…
    - 18 days ago Sunday, March 8, 2015 -
  • Risky Business Extra: Senator Scott Ludlam on mandatory metadata retention
    Senator Scott Ludlam of the Greens party is the only Australian politician kicking up a stink about the government's metadata retention bill. And we're glad about that, it's a pretty defective bill, even if some recent amendments recommended by the P…
    - 18 days ago Sunday, March 8, 2015 -
  • ISC StormCast for Friday, March 6th 2015
    XML Documents Used To Deliver Malicious Payloads to Wordhttps://isc.sans.edu/forums/diary/XML+A+New+Vector+For+An+Old+Trick/19423/Java for OS X Now Includes Adwarehttp://www.zdnet.com/article/oracle-extends-its-adware-bundling-to-include-java-for-mac…
    - 21 days ago Thursday, March 5, 2015 -
  • Chet Chat 188 - Mar 4, 2015
    Join Sophos experts Chester Wisniewski and Paul Ducklin as they dissect the week's security stories.Listen to the latest episode of the Chet Chat, our weekly educate-and-entertain podcast for anyone interested in computer security.
    - 22 days ago Thursday, March 5, 2015 -
  • Risky Business #356 -- Crypto Wars 2.0 with guest Alex Stamos
    This week's feature interview is with Alex Stamos, CISO of Yahoo. Alex did a fantastic AppSec keynote in early February that I wanted to ask him about, so we booked this interview a couple of weeks ago. Then, last week, Alex made the news. Big time.…
    - 22 days ago Thursday, March 5, 2015 -
  • ISC StormCast for Thursday, March 5th 2015
    "Ouch" SANS Security Awareness Newsletter http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201503_en.pdfDLink Works on Router Patch http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10052phpMoAdmin Vulnerability https:…
    - 22 days ago Wednesday, March 4, 2015 -
  • ISC StormCast for Wednesday, March 4th 2015
    "FREAK" SSL Attack: Old News, but sad that it is still out therehttps://freakattack.comRecent Changes to Sweet Orange Exploit Kit Javascript Obfuscationhttps://isc.sans.edu/forums/diary/An+Example+of+Evolving+Obfuscation/19403/"Free Gift Card" Malwar…
    - 23 days ago Tuesday, March 3, 2015 -
  • ISC StormCast for Tuesday, March 3rd 2015
    Lenovo Made $250k With Superfishhttp://www.forbes.com/sites/thomasbrewster/2015/02/27/lenovo-got-very-little-from-superfish-deal/Android Spotty Support for Full Disk Encryptionhttp://www.theregister.co.uk/2015/03/02/google_encrypted_by_default/ICANN…
    - 24 days ago Monday, March 2, 2015 -
  • Episode 154 - Open Source Architecture w/@mubix
     Martin & Steve get a change to talk to Rob Fuller (@mubix) about his ideas on Open Source Architecture.  It's a great conversation where you can see the idea grow in front of your own ears! The link to the Open Source Architecture group is: …
    - 24 days ago Monday, March 2, 2015 -
  • DtSR Episode 132 - Good Guys, Bad Guys, and Reality
    In this episode...We learn the origins of "RSnake" as told by Rob himselfRob gives us a peek into the dark side, from his contacts and experiencesWe discuss the black-hat economy as it's verticalized, specialized, and maturedRob discusses the bal…
    - 25 days ago Monday, March 2, 2015 -
  • ISC StormCast for Monday, March 2nd 2015
    Seagate NAS Remote Code Execution Vulnerabilityhttps://beyondbinary.io/advisory/seagate-nas-rce/Major Xen Vulnerability To Arrive Soonhttps://aws.amazon.com/premiumsupport/maintenance-2015-03/D-Link / Trendnet Vulnerabilitieshttps://github.com/darkar…
    - 25 days ago Sunday, March 1, 2015 -
  • ISC StormCast for Friday, February 27th 2015
    HTTP/2 and Firefox 36https://www.mozilla.org/en-US/firefox/36.0/releasenotes/https://tools.ietf.org/html/draft-ietf-httpbis-http2-17Comparing 2014 Vulnerability Statistics Between Operating Systemshttp://www.gfi.com/blog/most-vulnerable-operating-sys…
    - 28 days ago Thursday, February 26, 2015 -
  • Chet Chat 187 - Feb 25, 2015
    Sophos expert John Shier sits in for regular presenter Chester Wisniewski in this episode.John and Paul Ducklin dissect the latest security issues, which were dominated this week by some thorny matters of cryptography.
    - 29 days ago Thursday, February 26, 2015 -