LG refreshes Gram laptop lineup with Intel Kaby Lake processors, improved battery life

LG Gram laptop LG has largely scaled back its global PC ambitions…
February 24, 2017/by infosechotspot

Amazon will support Virginia cybersecurity initiative – Virginian-Pilot

A new strategic relationship between Amazon Web Services and…
February 24, 2017/by infosechotspot

Region works to develop cybersecurity consortium – St. Cloud Times

Business news(Photo: Times graphic) Even though it is hard…
February 24, 2017/by infosechotspot

NSA snoops told: Get your checkbooks and pens ready for a cyber-weapon shopping spree

US Cyber Command boss lays out plans for next decade NSA and…
February 24, 2017/by infosechotspot

First test: How long does the Nintendo Switch's battery last? – CNET

James Martin/CNET …
February 24, 2017/by infosechotspot

Tech firms stand up for transgender rights in Supreme Court brief – CNET

Several tech companies are signing a brief to the US Supreme…
February 24, 2017/by infosechotspot

Britain is beautiful in these winning photos from new drone photography competition – CNET

The beautiful lighthouse at Point of Ayr in North Wales is the…
February 24, 2017/by infosechotspot

IBM, Vermont Electric spawn intelligent energy software company

IBM today said it would partner with Vermont Electric Power to…
February 24, 2017/by infosechotspot

Don’t worry about Privacy Shield, it’s fine. Really. I promise, says US trade watchdog head

It's not fine The acting head of the US Federal Trade Commission,…
February 24, 2017/by infosechotspot

71% off Cambridge SoundWorks OontZ Angle 3 PLUS Wireless Bluetooth Speaker – Deal Alert

Designed and Engineered by Cambridge SoundWorks to deliver richer…
February 24, 2017/by infosechotspot

Researchers Uncover New Leads Behind Shamoon2

In a fresh analysis of the Shamoon2 malware, researchers from…
February 24, 2017/by infosechotspot

Cloudflare Leaked Web Customer Data For Months

Potential scope of issue evokes comparisons to Heartbleed. Cloudflare,…
February 24, 2017/by infosechotspot

Experts: Government Vulnerability Equities Process should be law

SAN FRANCISCO – A panel of experts at RSA Conference 2017…
February 24, 2017/by infosechotspot

iPhone Robbers Try to iPhish Victims

In another strange tale from the kinetic-attack-meets-cyberattack…
February 24, 2017/by infosechotspot

Apple is investigating an iPhone 7 Plus that ‘blew up’

A Twitter video of a smoking iPhone 7 Plus has gone viral, prompting…
February 24, 2017/by infosechotspot

SHA-1: 9,223,372,036,854,775,808 Reasons Not To Worry

The SHA-1 hash function is broken. This isn’t news. What…
February 24, 2017/by infosechotspot

Steamed Over Steam

Where would the PC gaming market be without Steam, the digital…
February 24, 2017/by infosechotspot

Two more states claim DHS probed election systems without permission

Two more states claim DHS probed election systems without permissionBy…
February 24, 2017/by infosechotspot

I come to bury SHA1, not to praise it

Most cryptography is theoretical research. When it is no longer…
February 24, 2017/by infosechotspot

Brazilian ERP giant Totvs reports weak results

Brazilian software firm Totvs has reported a revenue drop of…
February 24, 2017/by infosechotspot

Microsoft protecting Mexican people with new cybersecurity center

With all of the talk about border walls and immigration in the…
February 24, 2017/by infosechotspot

20 Cybersecurity Startups To Watch In 2017

VC money flowed plentifully into the security market last year,…
February 24, 2017/by infosechotspot

Fighting asthma with data

Fighting asthma with dataBy Matt Leonard Feb 24, 2017 Year after…
February 24, 2017/by infosechotspot

Donald Trump owns 3,600 Domains

CNNMoney has carried out an investigation on Donald Trump’s…
February 24, 2017/by infosechotspot

28 days of awareness: day 24

As the three awareness streams start to trickle and then flow,…
February 24, 2017/by infosechotspot

IaaS: The Next Chapter In Cloud Security

Organizations adopting IaaS must update their approach to security…
February 24, 2017/by infosechotspot

Cybersecurity of the power grid: A growing challenge

Cybersecurity of the power grid: A growing challengeBy Manimaran…
February 24, 2017/by infosechotspot

It's the end of SHA-1 and I feel fine

When the National Security Agency (NSA) introduced Secure Hash…
February 24, 2017/by infosechotspot

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 20, 2017

I’ve been fascinated with the rise and fall of exploit…
February 24, 2017/by infosechotspot

Suspect in Mirai malware attack on Deutsche Telekom arrested

The United Kingdom's National Crime Agency has arrested a suspect…
February 24, 2017/by infosechotspot

Get a free iPhone 7, Galaxy S7, or LG G5 from AT&T

Thinking about switching to AT&T or upgrading your current…
February 24, 2017/by infosechotspot

Microsoft's latest Windows 10 Creators update builds inch closer to completion

Microsoft has released new test builds of Windows 10 Creators…
February 24, 2017/by infosechotspot

Project Zero discovers Cloudflare bug leaking sensitive customer data

Google's Project Zero discovered a serious Cloudflare bug that…
February 24, 2017/by infosechotspot

Enterprise Security Weekly #34 – Routh Like South

Download Audio
February 24, 2017/by infosechotspot

Mysterious Gmail account lockouts prompt hack fears

Something happening here, what it is ain't exactly clear A substantial…
February 24, 2017/by infosechotspot

News in brief: Boeing data accidentally emailed; Russian cyber-war boost; alleged hacker arrested

by Kate Bevan Your daily round-up of some of the other stories…
February 24, 2017/by infosechotspot

Swiss-US Privacy Shield Replaces U.S.-Swiss Safe Harbor

Last month the United States Department of Commerce and Switzerland’s…
February 24, 2017/by infosechotspot

Sneaky Hack Steals Data By Watching Computer LEDs Blink

When an organization needs to make sure that a computer is as…
February 24, 2017/by infosechotspot

Google uses AI to create troll-spotting tool to clean up comments

by Lisa Vaas Toxic comments, how do we detest thee? Let me…
February 24, 2017/by infosechotspot

Threatpost News Wrap, February 24, 2017

Mike Mimoso and Chris Brook recap RSA and discuss the news of…
February 24, 2017/by infosechotspot

Setting Yourself Up to Win: Guidance for Data Classification Success

Our Definitive Guide to Data Classification series concludes…
February 24, 2017/by infosechotspot

Dropbox’s tool shows how chatbots could be future of cybersecurity

by John E Dunn Disillusion with chatbots has set in across…
February 24, 2017/by infosechotspot

Cloudflare Bug Leaks Sensitive Data

The Cloudflare content delivery network for months has been leaking…
February 24, 2017/by infosechotspot

What to Learn from GitLab's Recent Data Backup Disaster

Nothing teaches IT leaders more about their systems than when…
February 24, 2017/by infosechotspot

Google Cloud Platform rolls out Intel's latest Xeons

Google Cloud Platform is now offering services on Intel's latest…
February 24, 2017/by infosechotspot

How to add two-factor authentication to your WordPress site

Image: Jack Wallen WordPress is one of the most-used blogging…
February 24, 2017/by infosechotspot

10 ways to reduce insider BYOD threats

Image: iStock/Rawpixel Device management used to be so simple…
February 24, 2017/by infosechotspot

Cloudflare bug may have compromised over 1,000 sites

"It took every ounce of strength not to call this issue 'cloudbleed',"…
February 24, 2017/by infosechotspot

This Week in Security News

Welcome to our weekly roundup, where we share what you need to…
February 24, 2017/by infosechotspot

Learn More About Office 365 Through Live and On-Demand Webcasts

Microsoft has been running a series of 30 minute webinars over…
February 24, 2017/by infosechotspot

British man arrested after 900,000 broadband routers knocked offline in Germany

A 29-year-old man has been arrested at Luton airport by the UK’s…
February 24, 2017/by infosechotspot

Necurs Botnet Gets Proxy Module with DDOS Capabilities

Massive Necurs botnet, known for sending large spam campaigns,…
February 24, 2017/by infosechotspot

Cloudbleed: Websites Leaked Crypto Keys, Passwords, More Due to Cloudflare Bug

A Cloudflare bug uncovered by Google researchers has large websites…
February 24, 2017/by infosechotspot

A Primer on GDPR

At BH Consulting we have worked with our friends over at Tripwire…
February 24, 2017/by infosechotspot

Weekly update 23

I started out doing this weekly update with not much news to…
February 24, 2017/by infosechotspot

The “Final Final” is Here: NYDFS Cybersecurity Regulations

As Hogan Lovells previously reported, the New York State Department…
February 24, 2017/by infosechotspot

Virginia Expands Cybersecurity Training for Veterans in Bid to Fill Vacant Positions Statewide

Roughly three months after it began, Gov. Terry McAuliffe’s…
February 23, 2017/by infosechotspot

Get my goat

Posted by Kevin on February 24, 2017. If there’s one thing…
February 23, 2017/by infosechotspot

What a Linux Desktop Does Better

After I resolved to adopt Linux, my confidence grew slowly but…
February 23, 2017/by infosechotspot

Trump gets mixed reviews on cybersecurity, one month in

No definitive strategy or path has yet emerged to bolster the…
February 23, 2017/by infosechotspot

Fake apps, fake games: An update on gaming malware

Malware in mobile gaming is not a new occurrence. Mobile malware…
February 23, 2017/by infosechotspot

GE Digital VP Beena Ammanath: For Most Women, STEM Is an Uphill Battle

Beena Ammanath is vice president for data and analytics at GE…
February 23, 2017/by infosechotspot

What’s new in Microsoft’s SDL

This post is authored by Andrew Marshall, Principal Security…
February 23, 2017/by infosechotspot

50 banking smartphone apps fail on security

Tests on 50 banking mobile apps find that all are prone to vulnerabilities Research…
February 23, 2017/by infosechotspot

Trust and Risks Both Growing in Government Clouds

As the 2017 RSA Security Conference kicks off in San Francisco,…
February 23, 2017/by infosechotspot

Researchers use hacked hard drive LED to steal data from air-gapped computer

A still image from video captured by a drone as it recorded…
February 23, 2017/by infosechotspot

28 days of awareness: day 23

One advantage of having covered malware many times before is…
February 23, 2017/by infosechotspot

Podcast: Addressing the Skills Gap – How to keep our digital economy growing

When RSA’s Zulfikar Ramzan finished his keynote discussing…
February 23, 2017/by infosechotspot

Your Next Steps if Your AppSec Program Is in the Reactive Stage

By Suzanne Ciccone This is the first blog in a series that…
February 23, 2017/by infosechotspot

Biz Blog | LexisNexis®

Below is a guest post from LexisNexis's Thomas Stoeckle, who…
February 23, 2017/by infosechotspot

RSS

Newsletters Stay up to date on the latest CSO Online news Top…
February 23, 2017/by infosechotspot

What to Do About Fake News, Fake Apps and Fake Government Services

Hoaxes have been around forever. From online pictures of seven-headed…
February 23, 2017/by infosechotspot

On shaky ground: SHA-1 web standard cracked

SHA-1 has long been discredited for known weaknesses. Researchers…
February 23, 2017/by infosechotspot

Silent Epidemic: Data Theft has become a Public Health Crisis

One in four Americans was the victim of data theft, but policy…
February 23, 2017/by infosechotspot

Google Researchers 'Shatter' SHA-1 Hash

'Collision' attack by researchers at CWI Institute and Google…
February 23, 2017/by infosechotspot

Barely 1% of Android users are running Nougat, as Apple shows how to properly update devices

What are the most commonly over-looked piece of professional…
February 23, 2017/by infosechotspot

The Digital Transformation Marches On

Chances are, by now you’ve been looking into what it takes…
February 23, 2017/by infosechotspot

British man arrested over Mirai-based attack on Deutsche Telekom

Police have apprehended a 29-year-old British man in London on…
February 23, 2017/by infosechotspot

Healthcare Under Attack: Trend Micro Reveals All in New Report

Healthcare organizations (HCOs) around the world are under attack.…
February 23, 2017/by infosechotspot

Now Anyone Can Deploy Google’s Troll-Fighting AI

Last September, a Google offshoot called Jigsaw declared war…
February 23, 2017/by infosechotspot

Hack Naked News #112 – February 21, 2017

Download Audio
February 22, 2017/by infosechotspot

28 days of awareness: day 22

While working on next month's module, we're also thinking forward…
February 22, 2017/by infosechotspot

Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damage.

Are you a sysadmin who left your last job under a cloud? My advice…
February 21, 2017/by infosechotspot

Ex-NSA Contractor Facing Up to 200 Years in Prison

Harold Thomas Martin spent two decades amassing 50 terabytes…
February 16, 2017/by infosechotspot

The Dodge Challenger SRT Demon is ready for launch – Roadshow

The latest teaser discusses torque multiplication, which will…
February 16, 2017/by infosechotspot

Infocon: green

Microsoft February Patch Tuesday Now Rolled into March Updat…
February 16, 2017/by infosechotspot

Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World

In preparation for her keynote session at AppSec EU 2017 in Belfast,…
February 15, 2017/by infosechotspot