IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. read more more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…How to Steer Your Security Organization in a Toxic Environment
Five Ways to Steer Your Security Organization in a Toxic Environment read more more…News in brief: Berners-Lee warns on privacy; drone complaints up sharply; space researchers seek volunteers
Your daily round-up of some of the other stories in the news more…Researchers Hijack Jeep’s Steering, Brakes, Acceleration
Charlie Miller and Chris Valasek, the researchers who last year showed that cars can be remotely hijacked, are back with a new demonstration, and this time they managed to take over a vehicle’s acceleration, brakes and steering. read more more…Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Cane uses facial recognition to steer the blind to friends and family
Students at Birmingham City University in England have created a cane that recognises familiar faces and vibrates to let its blind owner know that they’re near people they know. Incoming search termsSilong Teernitcom more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…22-year-old "organized crime" cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…22-year-old “organized crime” cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…Need your Mt. Gox bitcoins back? Steer clear of this website
Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted in a ploy likely intended to distributed malware. read more more…US racketeering law enters the world of cybercrime
A Las Vegas court convicted a cybercriminal under RICO (Racketeering Influenced Corrupt Organizations Act) law last week, in what may well turn out to be a landmark case. more…WordPress Security Presentation by Tony Perez
Tomorrow I will be flying to my hometown (Miami) to give a Website Security presentation to a bunch of enthusiastic online professionals at an event called WordCamp. If you’re not familiar with these events, they are global events put together by the local populace to focus on a specific platform – WordPress. The event is […] more…Exploit available for new Chrome zero-day vulnerability, says Google
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT administrators. The warning comes after Google released a patch for Chrome to plug a use after free memory vulnerability (CVE-2026-2441) in cascading style sheets (CSS), which means the browser’s CSS engine isn’t properly managing memory […] more…Apple, Google agree to app store changes in the UK
Under pressure from UK regulators, Apple and Google have reached an agreement to change how they operate their app stores in the UK, the Competition and Markets Authority (CMA) announced on Tuesday. The agreement means both companies will not discriminate against apps that compete with their own apps and services. They pledged to be more transparent […] more…Buyer’s guide: How to choose the right business laptops
With hundreds of business-oriented laptops to choose from, picking the right ones to outfit your company’s workforce can be daunting. We’re here to help with a buyer’s guide that breaks the options into categories and provides details, price estimates, and pros and cons of each. Ranging from $200 for the cheapest budget models to nearly […] more…More information
- TDoS attacks target US emergency call centers
- Don’t look now, but the blue-collar remote work revolution is coming
- Vulnerability Remediation Firm Vulcan Cyber Raises $10 Million
- New Android security flaw spotted in China
- WikiLeaks pledges to dump more sensitive files ahead of U.S. election
- No Patches for Vulnerabilities in Linksys Wireless Routers
- Hacker Behind Over 90 Data Leaks Arrested in Thailand
- Facebook Announces Encrypted WhatsApp Backups
- Microsoft Starts 2014 With Four Security Advisories
- VMware one-ups Microsoft with vSphere 5.1