IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. read more more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…How to Steer Your Security Organization in a Toxic Environment
Five Ways to Steer Your Security Organization in a Toxic Environment read more more…News in brief: Berners-Lee warns on privacy; drone complaints up sharply; space researchers seek volunteers
Your daily round-up of some of the other stories in the news more…Researchers Hijack Jeep’s Steering, Brakes, Acceleration
Charlie Miller and Chris Valasek, the researchers who last year showed that cars can be remotely hijacked, are back with a new demonstration, and this time they managed to take over a vehicle’s acceleration, brakes and steering. read more more…Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Cane uses facial recognition to steer the blind to friends and family
Students at Birmingham City University in England have created a cane that recognises familiar faces and vibrates to let its blind owner know that they’re near people they know. Incoming search termsSilong Teernitcom more…Understanding the WordPress Security Plugin Ecosystem
As a child, did you ever play that game where you sit in a circle and one person is responsible for whispering something into one persons ear, and that message gets relayed around the circle? Wasn’t it always funny to see what the final message received would be? Oh and how it would have morphed […] more…22-year-old "organized crime" cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…22-year-old “organized crime” cybercrook convicted under racketeering law gets TWENTY years
David Ray Camez was just 17 when he embarked on life as a cyberfraudster, ending up in prison for seven years. But he was subsequently also convicted under racketeering laws, which provide for stiffer penalties. Now he’s been sentenced… more…Need your Mt. Gox bitcoins back? Steer clear of this website
Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted in a ploy likely intended to distributed malware. read more more…US racketeering law enters the world of cybercrime
A Las Vegas court convicted a cybercriminal under RICO (Racketeering Influenced Corrupt Organizations Act) law last week, in what may well turn out to be a landmark case. more…WordPress Security Presentation by Tony Perez
Tomorrow I will be flying to my hometown (Miami) to give a Website Security presentation to a bunch of enthusiastic online professionals at an event called WordCamp. If you’re not familiar with these events, they are global events put together by the local populace to focus on a specific platform – WordPress. The event is […] more…Application Security Protection for the Masses
I’ve always found it entertaining that so many sales pitches are essentially a listing of features for the product or service being sold. The reason I find this entertaining is that for anyone who has worked on the customer side or has ever listened to customers, it is obvious that customers buy solutions, not products. […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…More information
- Uncovering threat infrastructure via URL, domain and IP address advanced pivots a.k.a. Netloc Intelligence
- Cybersecurity M&A Roundup: 40 Deals Announced in March 2021
- 7 social engineering scams and how to avoid them
- Australia Flags New Corporate Penalties for Privacy Breaches
- Sanctioned Russian IT Firm Was Partner With Microsoft, IBM
- Qualcomm Modem Chip Flaw Exploitable From Android: Researchers
- Fileless Powershell malware uses DNS as covert communication channel
- So, Uh, That Billion-Account Yahoo Breach Was Actually 3 Billion
- November Patch Tuesday Addresses New IE Zero-Day Exploit, But TIFF Vulnerability Still Unpatched
- Palo Alto Networks Blames Tariffs for Firewall Price Hikes