US Joint Chiefs of Staff emails targeted by Russian hackers
The hacking group that targeted unclassified email systems at the U.S. Department of State and the White House is believed to have also compromised a network used by the Joint Chiefs of Staff, a body of senior U.S. military leaders. The email system used by the group was compromised in the last week of July, […] more…Enterprise security spending less on skills, more on technology
Sure, enterprises are investing more in their cybersecurity efforts: but is that a good thing? It could be, depending on how it is being spent. According to our 2015 US State of Cybercrime Survey of more than 500 respondents including US business executives, law enforcement services, and government agencies the priority for security spending in the […] more…Carly Fiorina calls on Apple, Google to provide greater access for FBI
Republican presidential candidate and former tech-executive Carly Fiorina has called on Apple and Google to provide greater access to information about their users to the FBI and law enforcement in order to aid investigations. Speaking Thursday in a televised debate in Cleveland organized by Fox News Channel, the former CEO of Hewlett-Packard said restrictions that […] more…10 tips to make sure you are ready when a disaster strikes
BIA Image by SVIDSHUB Start with a business impact analysis (BIA). This will identify the business’s most crucial systems and processes and the effect an outage would have on the business. The greater the potential impact, the more money a company should spend to restore a system or process quickly. To read this article in […] more…Sick of Flash security holes? HTML5 has its own
HTML5 has been billed as the natural, standards-based successor to proprietary plug-ins such as Adobe’s Flash Player for providing rich multimedia services on the Web. But when it comes to security, one of Flash’s major weaknesses, HTML5 is no panacea. In fact, HTML5 has security issues of its own. Julien Bellanger, CEO of application security monitoring firm […] more…Black Hat 2015: IoT devices can become transmitters to steal data
It’s possible to get a printer and other inexpensive network and Internet of Things devices to transmit radio signals that are detectable far enough away that they could be used to steal data from compromised networks, a researcher tells the Black Hat 2015 conference. By rapidly turning on and off the outputs from I/O pins […] more…EaseUS Partition Master Review- The best partitioning software
EaseUS Partition Master is the best partitioning tool and must look at one only if you need more power than the Windows Disk Management tool. This is one of those utilities provided to the PC users having all standard as well as advanced features which are must for any disk partitioning tool. This software does […] more…The GasPot Experiment: Hackers Target Gas Tanks
Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set everything ablaze. But imagine how riskier it is if a hacker can do all this remotely, especially now that a number of fuel companies worldwide […] more…How Secure Scrum can help you build better software
Agile, and Scrum in particular, continue to be popular methodologies for managing software development. But in their emphasis on generating working code quickly, do Agile and Scrum lead to security issues getting left by the wayside? A pair of computer science researchers in Germany think so and have developed a new version of Scrum that […] more…Mobile batteries become prime target for hackers
Batteries have become a new security risk for smartphone users, with a group of security researchers saying they are able to transmit personal data to hackers. Lukasz Olejnik, Gunes Acar, Claude Castelluccia and Claudia Diaz have written a paper outlining the risks, saying a piece of software used in the HTML5 web language transmits data […] more…Researchers develop astonishing Web-based attack on a computer’s DRAM
Millions of Web users could be vulnerable to an attack on their computer’s DRAM via the Web, a surprising development that expands on a bug that has increasingly worried computer security experts. It has been known for several years that densely packed memory cells on computers are vulnerable to intentional interference. But a new research […] more…9 ways developers can rebuild trust on the Internet
The Internet is a pit of epistemological chaos. As Peter Steiner posited — and millions of chuckles peer-reviewed — in his famous New Yorker cartoon, there’s no way to know if you’re swapping packets with a dog or the bank that claims to safeguard your money. To make matters worse, Edward Snowden has revealed that […] more…‘Morpho’ group goes after corporate IP
Symantec has identified a group of cybercriminals, whom they’ve named “Morpho,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft among those hit. “Attackers going after intellectual property is not that usual,” said Vikram Thakur, senior manager at Symantec. However, those attackers tend to be state-sponsored and target information or […] more…Esthost/Rove Digital Mastermind Pleads Guilty, Faces Six-Year Sentence
In November 2011 the Federal Bureau of Investigation (FBI), with the help of the Trend Micro Forward-looking Threat Researchers, conducted what was, at the time, the largest takedown in the history of online crime. Known as “Operation Ghost Click,” by the FBI, more than a hundred servers belonging to the Esthost/Rove Digital group were taken […] more…Hacker group that hit Twitter, Facebook, Apple and Microsoft intensifies attacks
The hackers that targeted Twitter, Facebook, Apple and Microsoft developers two years ago have escalated their economic espionage efforts as they seek confidential business information and intellectual property they can profit from. The group, which security researchers from Kaspersky Lab and Symantec call Wild Neutron or Morpho, has broken into the networks of over 45 […] more…Scammers bypass Google filters with PDF cloaking
Scammers have long used cloaking as a technique to drive up search engine rankings, stuffing webpages full of keywords and links that make them attractive to Google, but not to actual readers. Google wised up and those tactics became ineffective. But, according to a new report from SophosLabs, there is one twist on cloaking that […] more…More information
- Traffic Light Protocol for cybersecurity responders gets a revamp
- Android’s September 2020 Patches Fix Critical System Vulnerabilities
- US won’t release Russian MP’s son being held on PoS hacking charges
- Pirate Bay co-founder now suspected of serious fraud and another data intrusion
- Resolved: PAWS/Workflow Maintenance Work
- CloudFlare Leaked Sensitive Customer Data
- Locky Variant Osiris Distributed via Excel Documents
- Microsoft Skype for Business and Lync CVE-2018-8238 Security Bypass Vulnerability
- Companies Have Little Control Over User Accounts and Sensitive Files: Study
- Google Spends Record Amount on Lobbying