CVE-2017-0022: Microsoft Patches a Vulnerability Exploited by AdGholas and Neutrino

Part of this month’s Patch Tuesday is an update for a zero-day…
March 24, 2017/by infosechotspot

Is this hooded cyber-bandit the web's most prolific hacker?

I've been watching the cyber-news pretty closely lately and one…
March 24, 2017/by infosechotspot

Inside OpenSSL’s battle to change its license: Coders’ rights, tech giants, patents and more

Devs who fail to get respond to call for change will count as…
March 24, 2017/by infosechotspot

Weekly update 27

Another week down and looking back, I'm not sure precisely what…
March 24, 2017/by infosechotspot

Uber finally agrees to reveal diversity data

Uber Technologies has agreed to provide next month its diversity…
March 24, 2017/by infosechotspot

Razer zVault doles out free goodies for playing video games – CNET

Razer's Mamba wireless gaming mouse is one of the items you can…
March 24, 2017/by infosechotspot

Alibaba and AusPost team up to tackle food fraud with blockchain

Alibaba has joined forces with AusPost, Blackmores, and PwC to…
March 24, 2017/by infosechotspot

Google slaps Symantec for sloppy certs, slow show of SNAFUs

Certs will keep working, but Chrome will be suspicious, soon Google's…
March 23, 2017/by infosechotspot

Amazon's Chinese competitor heads overseas… with bad English – CNET

Alibaba…
March 23, 2017/by infosechotspot

Google proposes sending Symantec to TLS sin bin

Google has announced plans to reduce the trust in Symantec TLS…
March 23, 2017/by infosechotspot

NBlog March 24

Progress!  The staff seminar quickly spawned a management…
March 23, 2017/by infosechotspot

Cybersecurity stocks: one to buy and one to avoid

As more and more of our critical data moves online, cyber security…
March 23, 2017/by infosechotspot

ZTE confirms loss in 2016 due to guilty plea in Iran sanctions case

ZTE Corporation has released its financial results for 2016,…
March 23, 2017/by infosechotspot

Singapore firms must put stronger focus on reskilling amid rise of AI

At the start of the year, I was part of a panel that aimed to…
March 23, 2017/by infosechotspot

Infrastructure protection gets a boost with Kaspersky Industrial CyberSecurity

Kaspersky Lab has announced the global availability of Kaspersky…
March 23, 2017/by infosechotspot

No Woman's Land: Cybersecurity Industry Suffers From Gender Imbalance, Discrimination

(Credit: Shutterstock) Information security demand is far…
March 23, 2017/by infosechotspot

Cybersecurity spending varies but best practices still save

Estimates range from amounts per employee to percentages of…
March 23, 2017/by infosechotspot

Apple iCloud ransom demands: The facts you need to know

(Image: file photo) Hackers are demanding Apple pay a ransom…
March 23, 2017/by infosechotspot

Amazing new WikiLeaks CIA bombshell: Agents can install software on Apple Macs, iPhones right in front of them

And in 2009 – just 8 years ago Startling leaked documents…
March 23, 2017/by infosechotspot

FBI director floats international framework on access to encrypted data

FBI director James Comey has suggested that an international…
March 23, 2017/by infosechotspot

32% off Nintendo Wii Remote Plus, Toad – Deal Alert

Simple, intuitive and easy to use. The Wii Remote Plus is a unique…
March 23, 2017/by infosechotspot

Senators reintroduce a bill to improve cybersecurity in cars – TechCrunch

Senators Ed Markey of Massachusetts and Richard Blumenthal of…
March 23, 2017/by infosechotspot

OpenSuse Leap Reinforces Linux Faith

OpenSuse Leap 42.2 goes a long way toward maintaining Suse's…
March 23, 2017/by infosechotspot

Researchers build VistA interoperability into digital health platform demo

Researchers build VistA interoperability into digital health…
March 23, 2017/by infosechotspot

DV certificates abused but policing may not be possible

A security researcher found a high rate of abuse of domain validation…
March 23, 2017/by infosechotspot

No One Has All The Solutions – Why BAE Systems Is Backing A Cyber Security Accelerator

Source: BAE .No one company big or small can solve all…
March 23, 2017/by infosechotspot

Red Hat software-defined storage takes another step forward

Do you need software-defined storage (SDS) for your enterprise…
March 23, 2017/by infosechotspot

WikiLeaks Exposes CIA's Device Surveillance Tricks

WikiLeaks on Thursday announced that it had released more Vault…
March 23, 2017/by infosechotspot

WikiLeaks Dump Shows CIA Interdiction of iPhone Supply Chain

From the early days of the iPhone, the CIA has had an interest…
March 23, 2017/by infosechotspot

How to establish strong microservice security using SSL, TLS and API gateways

iStock/KrulUA I find the topic of microservices fascinating,…
March 23, 2017/by infosechotspot

NC rolling out upgrade to crime database query service

NC rolling out upgrade to crime database query serviceBy Stephanie…
March 23, 2017/by infosechotspot

Cisco Patches Critical IOx Vulnerability

Cisco Systems patched a critical vulnerability Wednesday that…
March 23, 2017/by infosechotspot

Malware That Targets Both Microsoft, Apple Operating Systems Found

Researchers came across a malicious Word document last week that…
March 23, 2017/by infosechotspot

18 free cloud storage options

The cloud is full of free storage, if you know where to look. From…
March 23, 2017/by infosechotspot

News in brief: WikiLeaks drops more CIA documents; ISP privacy rules killed; Instagram launches 2FA

by Kate Bevan Your daily round-up of some of the other stories…
March 23, 2017/by infosechotspot

Biz Blog | LexisNexis®

Public relations operations are a little different today than…
March 23, 2017/by infosechotspot

RSS

Newsletters Stay up to date on the latest CSO Online news Top…
March 23, 2017/by infosechotspot

Using personality profiling to make call centers more efficient

Andy Traba is Vice President of Behavioral and Data Science at…
March 23, 2017/by infosechotspot

‘Turkish’ hackers threaten to reset millions of iCloud accounts

by Guy Clapperton A new band of hackers, styling itself the…
March 23, 2017/by infosechotspot

How to install Config Server Firewall on CentOS 7

Image: Jack Wallen If you're looking to up your security game…
March 23, 2017/by infosechotspot

Why hardware configurations could be the downfall of the IoT

The Internet of Things is opening up new opportunities…
March 23, 2017/by infosechotspot

Ex-IT director accused of accessing his former employer for two years

by Lisa Vaas Columbia Sportswear is suing its former top IT…
March 23, 2017/by infosechotspot

Need Not Apply: Hack of Job Seeker Database Hits Workers in 10 States

America’s Joblink Alliance said on Wednesday that a…
March 23, 2017/by infosechotspot

Pwn2Own 2017 – An Event for the Ages

The 10th anniversary of Pwn2Own just successfully completed as…
March 23, 2017/by infosechotspot

Striking the Right Balance Between Security and Functionality

By Evan Schuman Doing security well is hard work, but it should…
March 23, 2017/by infosechotspot

Rediscovering Windows Libraries for Users and Admins

One feature that I really take advantage of in Windows is Libraries. These…
March 23, 2017/by infosechotspot

Apple: If hackers have our customers passwords, they didn't steal them from us

If you were worried that hackers might wipe millions of iPhones,…
March 23, 2017/by infosechotspot

7 Steps to Transforming Yourself into a DevSecOps Rockstar

Security practitioners at one education software firm offer lessons…
March 23, 2017/by infosechotspot

Android adware abusing plugin frameworks to promote potentially malicious apps

Android adware has embraced an innovative way to promote potentially…
March 23, 2017/by infosechotspot

5 Ways CISOs Could Work Better with Their Cyber Insurers

Risk management has become increasingly important, making it…
March 23, 2017/by infosechotspot

Five Reasons I Want China Running Its Own Software

Periodically I read about efforts by China, or Russia, or North…
March 23, 2017/by infosechotspot

Alleged C.I.A. Hacking Documents Reinforce Need for SSL Traffic Inspection

WikiLeaks this month released thousands of documents containing…
March 23, 2017/by infosechotspot

LastPass Fixes Serious Security Flaw in Chrome, Firefox Extensions

Password manager LastPass creates a workaround for a serious…
March 23, 2017/by infosechotspot

How can I create a restricted alternate PowerShell session configuration

$pssc = Get-PSSessionConfiguration -Name "DCMs"$psscSd = New-Object…
March 23, 2017/by infosechotspot

Third-Party App Stores Delivered via the iOS App Store

The iOS ecosystem is usually described as a closed ecosystem,…
March 23, 2017/by infosechotspot

2016 Review of Vulnerabilities

In our 2016 security roundup report, A Record Year for Enterprise…
March 23, 2017/by infosechotspot

Kaspersky AdCleaner: Anti-Banner for iOS

Kaspersky Internet Security and Kaspersky Total Security users…
March 23, 2017/by infosechotspot

Industry pros call bluff on claims of iCloud accounts held for ransom

Industry insiders told SC Media that Apple doesn’t believe…
March 23, 2017/by infosechotspot

What Does an Advanced Application Security Program Look Like?

By Suzanne Ciccone This is the fourth and final entry in a…
March 23, 2017/by infosechotspot

Google: More websites failing victim to cybercriminals

The number of websites compromised by cybercriminals during 2016…
March 23, 2017/by infosechotspot

The S In HTTPS

If you’ve ever bought anything online, checked your bank…
March 23, 2017/by infosechotspot

Author of Citadel malware, used to steal $500 million from bank accounts, pleads guilty

The Russian author of the notorious Citadel malware which infected…
March 23, 2017/by infosechotspot

US prosecutors expected to accuse North Korea over Bangladesh Bank cyber attack

Finger of blame for Bangladesh Bank cyber attack expected to…
March 23, 2017/by infosechotspot

The GDPR and your data protection obligations

The focus is growing for the European Union’s forthcoming…
March 23, 2017/by infosechotspot

The age of hacking brings a return to the physical key

The age of hacking brings a return to the physical keyBy Jungwoo…
March 23, 2017/by infosechotspot

Data breach disclosure 101: How to succeed after you've failed

Organisations don't plan to fail. Probably the closest we get…
March 23, 2017/by infosechotspot

Digital Guardian Selected for JMP Securities Super 60 List of the Hottest Privately Held Companies

We’re excited to have been named to the JMP Securities…
March 23, 2017/by infosechotspot

NBlog March 23

Nothing much to say today - we're too busy working on the security…
March 22, 2017/by infosechotspot

Microsoft Expands Office 365 Profiles; Shows the Value in the First Release Program

Beginning with OneDrive for Business and SharePoint Online for…
March 22, 2017/by infosechotspot

Google Gives Devs First Look at Android O

Google on Tuesday unveiled a developer preview of the latest…
March 22, 2017/by infosechotspot

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

An IBM security operations center. Image: John Mottern/IBM After…
March 22, 2017/by infosechotspot

Hack Naked News #116 – March 21, 2017

Download Audio
March 22, 2017/by infosechotspot

Paying for ransomware could cost you more than just the ransom

Ransomware attacks are now incredibly sophisticated and occurring with…
March 22, 2017/by infosechotspot

Cybercriminals Learn to Love Extensions like Toolbars in Recent Targeted Attacks

In the late 90s and early 2000s, most web browsers came with…
March 22, 2017/by infosechotspot

How Will Governors Address Cybersecurity and Infrastructure in 2017?

Last July, Virginia Gov. Terry McAuliffe, the 2016-17 chair of…
March 22, 2017/by infosechotspot

The State of the Union for IoT — or Not?

As I left the RSA Conference in San Francisco this year, I was…
March 22, 2017/by infosechotspot

Online Denial of Service Attacks Are a Growing Concern

Last year, millions of Australians were unable to fill out mandatory…
March 22, 2017/by infosechotspot

eBay Asks Users to Downgrade Security

Last week, KrebsOnSecurity received an email from eBay. The company…
March 22, 2017/by infosechotspot

WikiLeaks, Vault 7, and Vulnerability Disclosure: Is It Blackmail?

By John Zorabedian If you're hit by ransomware, you're presented…
March 22, 2017/by infosechotspot

Cisco issues patches for flaws stockpiled by CIA, exposed by WikiLeaks

Cisco issues patches for flaws stockpiled by CIA, exposed by…
March 22, 2017/by infosechotspot

Demi Lovato nudes leaked, scammer targets private citizens for sex shows

Demi Lavoto has joined the list of celebrities whose private…
March 22, 2017/by infosechotspot

No Need for a Standing Order on Cyber Attacks

It has been two months since Donald Trump took office, and…
March 22, 2017/by infosechotspot

A new best practice to protect technology supply chain integrity

This post is authored by Mark Estberg, Senior Director, Trustworthy…
March 22, 2017/by infosechotspot

HTTPS interception, middlebox models under fire

Security products and services that intercept traffic sent between…
March 22, 2017/by infosechotspot

Addressing Virtualization Challenges with SDDC

The rise of virtualization has shifted focus and control away…
March 22, 2017/by infosechotspot

Millions of SAP users exposed to ransomware due to GUI vulnerability

© Incisive Business Media © Incisive Business Media…
March 22, 2017/by infosechotspot

Winnti Abuses GitHub for C&C Communications

With additional analysis from Cyber Safety Solutions Team Developers…
March 22, 2017/by infosechotspot

Anti-Phishing Simulation and awareness market overview

CyberDB research about Phishing covers different types of phishing…
March 22, 2017/by infosechotspot

The Antarctic Biennale: Cybersecurity meets science and art

We’ve already posted about Eugene Kaspersky and about a…
March 22, 2017/by infosechotspot

The economics of cybersecurity for the undecided

Buyers rarely use all the information necessary to evaluate the…
March 22, 2017/by infosechotspot

SN 604: Taming Web Ads

This week Steve and Leo discuss developments in the new windows…
March 21, 2017/by infosechotspot

NBlog March 22

As part of the background research for next month's awareness…
March 21, 2017/by infosechotspot

Holy handsets, Batman! Gresso's take on the Nokia 3310 costs $3,000 – CNET

Gresso …
March 3, 2017/by infosechotspot

Instant messenger Line working on a virtual assistant to topple Alexa – CNET

Enlarge Image …
March 3, 2017/by infosechotspot

VRP news from Nullcon

March 2, 2017/by infosechotspot

Over 800,000 user account details stolen from vulnerable forums running vBulletin

If you’re a member of an online forum, there’s a…
February 28, 2017/by infosechotspot

Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damage.

Are you a sysadmin who left your last job under a cloud? My advice…
February 21, 2017/by infosechotspot

Ex-NSA Contractor Facing Up to 200 Years in Prison

Harold Thomas Martin spent two decades amassing 50 terabytes…
February 16, 2017/by infosechotspot

The Dodge Challenger SRT Demon is ready for launch – Roadshow

The latest teaser discusses torque multiplication, which will…
February 16, 2017/by infosechotspot

Infocon: green

Microsoft February Patch Tuesday Now Rolled into March Updat…
February 16, 2017/by infosechotspot
Load more