Entries by infosechotspot

Pentagon Thinks Blockchain Technology Can be Used as Cybersecurity Shield – CoinTelegraph

Original Article Here

Original Article HereJust like any currency, Bitcoin has been involved in cases of money-laundering, drug transactions, and terrorism in previous years. However, it has also caught the Pentagon’s eyes as a potential cybersecurity shield. Why Blockchain technology? The US military has been open about their interest in Blockchain technology, so it’s no surprise that they […]

Sonar-based attack could help hackers infer when you're having sex

Original Article Here

Original Article Here Hackers could use a sonar-based attack to infer information about what a target is doing, including when they might be engaging in sexual activity. The attack, known as CovertBand, is the product of four researchers’ work at the University of Washington’s Paul G. Allen School of Computer Science & Engineering. These individuals […]

Why Notre Dame center wants to join cybersecurity fight – Indianapolis Star

Original Article Here

Original Article Here CLOSE Career yardage leaders for passing, rushing and receiving at Notre Dame. Scott Horner/IndyStar Sep 12, 2015; Charlottesville, VA, USA; Notre Dame Fighting Irish offensive lineman Sam Mustipher (53) participates in warm-ups prior to the Fighting Irish’ game against the Virginia Cavaliers at Scott Stadium. Mandatory Credit: Geoff Burke-USA TODAY Sports(Photo: Geoff […]

F-22 Raptor getting weapons, cybersecurity upgrades – The News Herald

Original Article Here

Original Article Here Despite no longer being in production, the jet remains “critical” to the Air Force mission, officials said, and is undergoing upgrades to its cybersecurity, weapons and radar technology. COLLIN BREAUX News Herald Reporter @PCNHCollinB TYNDALL AIR FORCE BASE — When the last Air Force-ordered F-22 Raptor left Lockheed Martin in early 2012, […]

RSS

Original Article Here

Original Article Here Newsletters Stay up to date on the latest CSO Online news Top Authors About RSS Feeds Keep up to date effortlessly on the latest technology news, reviews and analyses using our RSS feeds. You can use an RSS newsreader like Feedly, Flipboard or Pulse to get all our latest headlines, or just […]

‘No More Ransom’ Program Grows: Initiative Helps Global Organizations Deal with Ransomware

Original Article Here

Original Article Here Over the past few years, ransomware cyberattacks have increasingly impacted public and private-sector organizations. The recent outbreaks NotPetya and WannaCry are only two of the many different examples of malware wreaking havoc across the globe. A recent Google study says that ransomware is here to stay, and cyberthieves have made at least […]

On Metrics: Responding to Failing Security Grades

Original Article Here

Original Article HereWith new data breaches, cyberattacks, nation-state hacking, ransomware outbreaks and related stories making news media headlines daily, the global cybersecurity landscape has become somewhat of a blur for the vast majority of us. As a result, only the biggest hacking stories (I’m talking really bad incidents with broad impact such as HBO’s recent […]

The greatest cyber security threats of 2017

Original Article Here

Original Article Here Show some love by Sharing… The first half of the year have seen an inordinate number of cyber security meltdowns. And they weren’t just your standard corporate breaches. There’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. Advertisement – Continue reading below According to […]

America's weak cybersecurity puts our nation at risk of a modern 9/11

Original Article Here

Original Article HereAs serious as Kim Jong Un’s threats are to attack Guam, Alaska or Hawaii with nuclear ballistic missiles, it’s likely that any future conflict will begin, and possibly end, with non-kinetic but no less crippling cyber warfare. This kind of warfare encompasses the assault on the electronic “connective tissue” of modern society by […]

Use a cybersecurity incident response plan with BC/DR

Original Article Here

Original Article HereOutcomes of a cybersecurity event can be just as damaging to an organization as a more traditional business continuity/disaster… Sign in for existing members Step 2 of 2: By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree […]

LENSAlert touches residents where they live (literally)

Original Article Here

Original Article Here LENSAlert touches residents where they live (literally) By Sara Friedman Aug 18, 2017 In Louisville, Ky., city officials monitor weather conditions for over 400 square miles in Jefferson County.  Using Rave Mobile Safety technology to power the Louisville emergency notification system called LENSAlert, they can send targeted notifications to residents’ phones about […]

Mastering Article 30 Compliance: Conducting, Maintaining and Reporting on your Data Inventory

Original Article Here

Original Article Here As part of its Summer / Fall Privacy Insight Series, TrustArc hosted a webinar where Charles Nwasor of Ensono, Paul Iagnocco and Margaret Alson of TrustArc spoke about the EU GDPR Article 30 requirements. Article 30 pertains to Records of Processing Activities. Not only do organizations have to keep records, but also, […]

Russian-Speaking APT Engaged in G20 Themed Attack

Original Article Here

Original Article Here A newly discovered dropper for the KopiLuwak backdoor suggests that the Turla group is back at it again, Proofpoint says. Turla, a long operating advanced persistent threat group (APT) with presumed ties to the Russian government, appears to be actively targeting G20 participants and those interested in its activities including policymakers, member […]

Merged VR: Augmented Reality Cubed

Original Article Here

Original Article Here There is considerable development activity at the high end of hardware and content creation for virtual reality and augmented reality, as well as such AR aliases as mixed reality, extended reality and others. Most industry investment is aimed at leading-edge gaming and industrial application development. However, the low-end of the market is […]

Docker strives for profit with new Enterprise Edition

Original Article Here

Original Article HereDocker has released Docker Enterprise Edition (DEE), a Container-as-a-Service (CaaS) platform for managing and securing Windows, Linux, and mainframe containerized applications across multiple platforms both on premises and in the cloud. DEE provides a container management platform that unites Windows, Linux, and Mainframe apps on a single platform on the same cluster. This […]

Vendor Exposes Backup of Chicago Voter Roll via AWS Bucket

Original Article Here

Original Article HereVoter registration data belonging to the entirety of Chicago’s electoral roll—1.8 million records—was found a week ago in an Amazon Web Services bucket configured for public access. The data was a backup stored in AWS by Election Systems & Software (ES&S), a voting machine and election management systems vendor based in Omaha, Ne. […]

Neo-Nazi Site Takedown Raises Tough Questions on Who Should Police Content

Original Article Here

Original Article Here FL-photography/Thinkstock Neo-Nazi website the Daily Stormer hopped from one service provider to another this week as a string of companies, including Google, GoDaddy and Cloudflare, cancelled its accounts in the wake of the Charlottesville attack. The issue has brought up a lot of questions around who should have the final say in […]

Carbon Emissions: Oversharing Bug Puts Security Vendor Back in Spotlight

Original Article Here

Original Article HereLast week, security firm DirectDefense came under fire for over-hyping claims that Cb Response, a cybersecurity product sold by competitor Carbon Black, was leaking proprietary from customers who use it. Carbon Black responded that the bug identified by its competitor was a feature, and that customers were amply cautioned in advance about the potential privacy […]

Hijacked Chrome extensions infect millions of users

Original Article Here

Original Article Here New research shows millions of Google Chrome users have been hit with malware through eight hijacked Chrome extensions. According to threat protection vendor Proofpoint, the eight compromised Chrome browser extensions include two that were hijacked earlier this month — Copyfish and Web Developer. According to the Proofpoint researcher known as Kafeine, the […]

ShieldFS Hits 'Rewind' on Ransomware

Original Article Here

Original Article Here INsecurity – For the Defenders of Enterprise Security A Dark Reading ConferenceWhile “red team” conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the “blue team” will be the focus.

Infosys CEO Vishal Sikka resigns

Original Article Here

Original Article Here Vishal Sikka Infosys chief executive Vishal Sikka issued a shock announcement Friday that he has resigned his position amid executive tensions and an “untenable atmosphere” surrounding the company. what’s hot on zdnet “I cannot carry out my job as CEO and continue to create value, while also constantly defending against unrelenting, baseless/malicious […]

New Faketoken Android malware records calls, intercepts texts, and steals credit card info

Original Article Here

Original Article HereA year-old piece of Android malware has begun to evolve, taking it from low-level nuisance to serious security threat. Called Faketoken, the malware is able to record phone calls, intercept and redirect text messages, and put screen overlays on an estimated 2,000 apps to fake payment information windows. Kaspersky labs reports that Faketoken […]

Friday Five: 8/18 Edition

Original Article Here

Original Article Here It’s Friday! Catch up on the latest infosec news with this week’s roundup. 1. HBO social media hacked in latest cyber security breach by BBC News In the latest cyberattack on HBO, OurMine, the group that breached Mark Zuckerberg’s social media accounts last year, hacked HBO’s main corporate Facebook and Twitter accounts. […]

Tally of GoldenEye’s damage to corporate earnings reaches half a billion dollars

Original Article Here

Original Article Here June’s GoldenEye (Petya/NotPetya) ransomware contagion crippled power distributors, pharmaceutical companies, banks, advertisers and even law firms, sparing no organization running a vulnerable infrastructure. Earning reports from several affected companies now reveal just how much the attack damaged some industries. Despite the widely accepted theory that GoldenEye was deployed mainly to shake up […]

Lenovo Posts Surprise Loss as PC Sales Crater, Costs Climb

Original Article Here

Original Article Here Yang Yuanqing, Lenovo CEO, unveils the new PHAB2 Pro, the world’s first Tango-powered smartphone at Lenovo Tech World at The Masonic Auditorium on June 9, 2016 in San Francisco, California. Kelly Sullivan/Getty Images (Bloomberg) — Lenovo Group Ltd. posted a surprise quarterly loss after losing its grip on the global personal computer market, […]

63% off Anker SoundCore 2 Bluetooth Speaker with 24-Hour Playtime – Deal Alert

Original Article Here

Original Article HereSoundCore 2 From Anker produces outstanding audio from an astonishingly compact speaker. Upgraded 2x 6W drivers blast out rich, clear sound. IPX5 water-resistant rating and dustproof engineering mean you can bring your beats anywhere – from the garden, to the beach. Upgraded materials provide smooth touch, and better grip. Listen for up to 66ft […]

Level up your cybersecurity journey with CLOUDSEC 2017

Original Article Here

Original Article Here Beginning this month, Trend Micro will be hosting CLOUDSEC, one of the largest cybersecurity conferences across Asia-Pacific and Europe. The event features presentations and panel discussions from industry experts and thought leaders who will discuss high-level strategies, forward looking security measures, and security roadmaps affecting the different markets. Now on its seventh […]

Threatpost News Wrap, August 18, 2017

Original Article Here

Original Article HereMike Mimoso and Tom Spring discuss this week’s security news, including recent abuse of Google Chrome extensions for fraud, a close look at Adobe’s decision to end of life Flash Player, and a backdoor discovered in NetSarang server management software’s update mechanism. Download: Threatpost News Wrap Aug. 18, 2017 Music by Chris Gonsalves. […]

NIST Security Draft Promises New Privacy Standards for US Federal Agencies

Original Article Here

Original Article Here The US National Institute of Standards and Technology (NIST) has drafted a new set of privacy standards that US federal agencies will have to abide by when implementing new interconnected systems related to the internet-of-things (IoT). The draft, entitled “Security and Privacy Controls for Information Systems and Organizations”, addresses the security and […]

This Week in Security News

Original Article Here

Original Article Here Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back […]

Six myths about blockchain and Bitcoin: Debunking the effectiveness of the technology

Original Article Here

Original Article HereBlockchain: so cool, what a breakthrough — soon almost everything will be based on blockchain technology. If you bought all of that, then I might just disappoint you. This article will discuss the version of blockchain technology that is used for Bitcoin cryptocurrency. There are other implementations, and they may have eliminated some […]

Multiple critical security vulnerabilities in Drupal 8, patches released

Original Article Here

Original Article Here Users of website management platform Drupal are urged to immediately update their system, after versions 8.0 through 8.3.6 have been affected by a number of critical security vulnerabilities, announced Drupal Security Team on Wednesday. As a result, the company has released a number of security patches to fix the access bypass vulnerabilities […]

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 14, 2017

Original Article Here

Original Article Here One of my favorite movies is the 1999 comedy “Galaxy Quest,” which features the cast of a science-fiction television series similar to Star Trek. In the movie, the crew is visited by real aliens who ask them for help against an intergalactic adversary because they believe that Galaxy Quest is a documentary […]

IDG Contributor Network: Can the U.S. Senate secure the Internet of Things?

Original Article Here

Original Article HereAs a free and open internet continues to come under assault by the FCC’s proposal to effectively end net neutrality, investors, programmers, and internet users of all stripes have vociferously voiced their support of the Internet of Things (IoT) and the open web that enables it. It appears those voices have been heard, […]

LG hit by WannaCry ransomware after IT staff fail to apply security patches

Original Article Here

Original Article Here South Korean electronics giant LG is believed to have been infected with the WannaCry ransomware after IT staff failed to apply security patches to all its Windows PCs and servers.  WannaCry infected several hundred thousand Windows machines within days of its release in May, using a US National Security Agency (NSA) exploit to […]