New Tool Detects Evil Maid Attacks on Mac Laptops

DoNotDisturb - DND
A security researcher has developed a simple tool that helps Mac laptop owners detect unauthorized physical access to their device, also known as an evil maid attack, by monitoring its...
Continue reading
0 Comments

Closing the Gaps that Result in Compromised Credentials

Credential Theft
Closing Gaps in Credential Security Requires Awareness of What Gaps Exist and How to Mitigate Them On March 23rd, 2018, the United States brought charges against nine Iranians for their...
Continue reading
0 Comments

What You Need to Know About GDPR Breach Disclosure, Response

What You Need to Know About GDPR Breach Disclosure, Response
image
image
Anti-Fraud , Anti-Malware , Application Security What You Need to Know About GDPR Breach Disclosure, Response Moving Organizations Toward Privacy by Design or Default• April 23, 2018     Incident...
Continue reading
0 Comments

SunTrust: 1.5 Million Clients' Details Potentially Stolen

SunTrust: 1.5 Million Clients' Details Potentially Stolen
Breach Notification , Breach Response , Data Breach SunTrust: 1.5 Million Clients' Details Potentially Stolen Blame Insider Theft, 'Not a Data Breach,' Claims Atlanta Bank's CEO( euroinfosec ) • April...
Continue reading
0 Comments

Analysis: 'Orangeworm' Attacks Appear to Involve Espionage

Analysis: 'Orangeworm' Attacks Appear to Involve Espionage Symantec Researcher Jon DiMaggio Analyzes Group's Attacks on the Healthcare Sector) • April 24, 2018     15 Minutes    Corporate espionage appears to...
Continue reading
0 Comments

Live Webinar | Phishing Like the Bad Guys: Social Engineering's Biggest Success

You might also be interested in … Around the Network Subscribe Please fill out the following fields (All fields required): CountryUnited StatesCanadaIndiaAfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean...
Continue reading
0 Comments

The Role of AI and ML in Minimizing Alert Fatigue

Artificial Intelligence & Machine Learning , Next-Generation Technologies, Secure Development Ted Julian of IBM Resilient Discusses Orchestration and Automation• April 24, 2018     Ted Julian, vice president, product management, IBM...
Continue reading
0 Comments

Symantec: 'Orangeworm' Group Hits Healthcare Organizations

Symantec: 'Orangeworm' Group Hits Healthcare Organizations
image
Data Breach , Data Loss , Endpoint Security Custom Backdoor Lands on X-Ray and MRI Machines( jeremy_kirk ) • April 24, 2018    Source: Symantec Large healthcare companies in the...
Continue reading
0 Comments

Atlanta's Ransomware Cleanup Costs Hit $2.6 Million

Atlanta's Ransomware Cleanup Costs Hit $2.6 Million
image
image
Fraud Management, Cybercrime , Governance , Incident Response Money Would Have Been Better Spent on Prevention, Experts Say( euroinfosec ) • April 24, 2018    Atlanta skyline at night. (Photo:...
Continue reading
0 Comments

Vulnerability Management: Why the Problem Can't Be Solved

Endpoint Security , Governance , Patch Management 86 Percent of Bugs Patchable Within 24 Hours, Says Flexera's Alejandro Lavie( euroinfosec ) • April 24, 2018     Alejandro Lavie, director, security...
Continue reading
0 Comments

Portugal Joins NATO Cyber-Defence Centre

Portugal on Tuesday became the 21st country to join NATO's cyber defence centre, the Tallinn-based body said at a flag-raising ceremony.  "We are facing adversaries who target our common values...
Continue reading
0 Comments

$35 Million Penalty for Not Telling Investors of Yahoo Hack

US securities regulators on Tuesday announced that Altaba will pay a $35 million penalty for not telling them hackers had stolen Yahoo's "crown jewels." The 2014 breach blamed on Russian...
Continue reading
0 Comments

Cambridge Analytica Says it is 'No Bond Villain'

Cambridge Analytica claimed Tuesday it was "no Bond villain" as it vehemently denied exploiting Facebook users' data for the election campaign of US President Donald Trump. The marketing analytics firm...
Continue reading
0 Comments

Safe Browsing Now On by Default on Android

Google is taking another step to protect Android users when browsing the Internet by making Safe Browsing in WebView set by default. Launched in 2007, Google Safe Browsing was designed...
Continue reading
0 Comments

Clear Scope for Conflict Between Privacy Laws

The Clarifying Lawful Overseas Use of Data Act, or CLOUD Act, was enacted into U.S. federal law on March 23, 2018. It had been attached, at page 2212 of 2232...
Continue reading
0 Comments

Vulnerability in NVIDIA Tegra Chipsets Allows for Code Execution

A vulnerability in NVIDIA's Tegra chipsets allows for the execution of custom code on locked-down devices, security researcher Kate Temkin reveals. Dubbed Fusée Gelée, this exploit leverages a coldboot vulnerability...
Continue reading
0 Comments

Hackers Can Steal Cryptocurrency From Air-Gapped Wallets: Researcher

Beatcoin attack exfiltration rates
Air-gapped cryptocurrency wallets are believed to hold private keys stored in them secure, but an Israeli researcher has demonstrated that attackers can leak the keys from such wallets in a...
Continue reading
0 Comments

Code Execution Flaws Patched in Foxit PDF Reader

Foxit has addressed over a dozen vulnerabilities in their PDF Reader, a free application that provides users with an alternative to Adobe Acrobat Reader. Designed for viewing, creating, and editing...
Continue reading
0 Comments

Drupal to Release Second Drupalgeddon2 Patch as Attacks Continue

Follow-up patch coming from Drupalgeddon2
Drupal developers announced on Monday that versions 7.x, 8.4.x and 8.5.x of the content management system (CMS) will receive a new security update later this week. The Drupal core updates,...
Continue reading
0 Comments

Flexibility vs. Security - A False Choice

Balance
 Striking a Balance Between Security and Flexibility is Crucial Over the last twenty or so years I’ve been a part of a lot of different environments. Companies as small as...
Continue reading
0 Comments