Microsoft Publishes Standards for "Highly Secure" Windows 10 Devices

view counter
image


Microsoft this week published information on the standards a Windows 10 device is required to meet to be considered highly secure. The company has provided details on both hardware and...
Continue reading
0 Comments

Chrome 62 Update Patches Serious Vulnerabilities

view counter
image


The second update released by Google for the Windows, Mac and Linux versions of Chrome 62 patches a couple of vulnerabilities rated critical and high severity. The critical flaw, tracked...
Continue reading
0 Comments

Siemens and Tenable Partner to Protect Industrial Networks

view counter
image


Siemens and Tenable Partner to Provide Asset Discovery and Vulnerability Management For Industial Networks Worsening geopolitical tensions and increasing awareness of the potential harm caused by cyber attacks against the...
Continue reading
0 Comments

Avira Helps ISPs, Manufacturers Build Security Into Routers

view counter
image


Avira, a firm known mostly for its antivirus products, announced on Monday the launch of a new IoT security solution designed to help Internet service providers (ISPs) and router manufacturers...
Continue reading
0 Comments

Hack of Global Law Firm Appleby Exposes Rich and Famous

view counter
image


'Paradise Papers' Expose Financial Moves by Global Elite Following the huge 2016 leak of documents stolen from Panamanian firm Mossack Fonseca (aka, the Panama Papers ), the expected analyses of...
Continue reading
0 Comments

Twitter-Happy Trump to Enter China's Great Firewall

view counter
image


US President Donald Trump has tweeted energetically throughout his Asian tour so far, but in China he will likely be one of a select few to skirt the country's ban...
Continue reading
0 Comments

Container Security Firm NeuVector Raises $7 Million

NeuVector Logo
view counter
image


NeuVector, a San Jose, Calif.-based developer of container security technology, today announced that it has raised $7 million in Series A funding led by Hummer Winblad Venture Partners. Launched in...
Continue reading
0 Comments

Six Months to Go: Getting Ready for GDPR

The latest ISMG Security Report features highlights from the recent panel discussion at the ISMG Fraud and Breach Prevention Summit in London on preparation for the European Union's General Data...
Continue reading
0 Comments

Targeted Attacks in Office 365 - Risks & Opportunities

× Close Request to Republish Content Original link
Continue reading
0 Comments

Report: US Weighs DNC Hacking Charges Against Russians

Report: US Weighs DNC Hacking Charges Against Russians
Cybersecurity , Data Breach , Data Loss Prosecutors May Charge Six Russian Officials, Wall Street Journal Reports Mathew J. Schwartz ( euroinfosec ) • November 2, 2017     U.S....
Continue reading
0 Comments

Essential Elements of an Incident Response Plan


Governance , Incident Response CISO Thom Langford on Key Considerations for Creating and Testing an Effective Plan Joan Goodchild • November 3, 2017     Thom Langford, CISO, Publicis Groupe...
Continue reading
0 Comments

Australian Government Contractor Exposed 50,000 Records

Australian Government Contractor Exposed 50,000 Records
Authentication , Cloud Computing , Data Breach Misconfigured, Unprotected Amazon S3 Bucket Blamed for Data Exposure Jeremy Kirk ( jeremy_kirk ) • November 3, 2017     Photo: Jules Pecnard...
Continue reading
0 Comments

Hackers Exploit Weak Remote Desktop Protocol Credentials

Hackers Exploit Weak Remote Desktop Protocol Credentials
image
image
Authentication , ID & Access Management , Ransomware Darknet Markets Sell Harvested RDP Credentials for as Little as $3 Mathew J. Schwartz ( euroinfosec ) • November 3, 2017  ...
Continue reading
0 Comments

Advantech Patches Code Execution Flaws in SCADA Product

view counter
image


An update released by Taiwan-based industrial automation company Advantech for its WebAccess product patches two remote code execution vulnerabilities, ICS-CERT reported on Thursday. Advantech WebAccess is a browser-based software package...
Continue reading
0 Comments

Equifax Says Execs Unaware of Hack When They Sold Stock

view counter
image


Equifax said Friday an internal review found that four executives who sold shares ahead of disclosure of a massive data breach at the credit agency were unaware of the incident...
Continue reading
0 Comments

Stopping Threats Starts with Getting Back to the Basics

IT Security Basics
view counter
image


Over the past year there have been a large number of high profile security breaches. Millions of organizations have been impacted. Tens of millions of names along with personally identifiable...
Continue reading
0 Comments

Poisoned Google Search Results Lead to Banking Trojan

view counter
image


A recently observed Zeus Panda banking Trojan attack used poisoned Google search results for specific banking related keywords to infect users, Cisco Talos researchers warn. As part of this attack,...
Continue reading
0 Comments

Stack Ranking SSL Vulnerabilities: DUHK and ROCA

List of Dangerous Software Vulnerabilities
USB for Quantum Random Number Generation (RNG)
view counter
image


Even with catchy branding and cute mascot and a theme song , these two SSL/TLS vulnerabilities nearly went unnoticed last week. The WPA2 Key Reinstallation Attack (KRACK) overshadowed them both,...
Continue reading
0 Comments

New York State Proposes Stricter Data Protection Laws Post Equifax

view counter
image


New York State Attorney General Eric T. Schneiderman introduced new legislation Thursday, designed to protect New Yorkers from corporate data breaches like the recent Equifax breach  that affected more than...
Continue reading
0 Comments

Russia-Linked Hackers Target Turkish Critical Infrastructure

view counter
image


A Russia-linked threat group has been targeting people associated with Turkish critical infrastructure through compromised Turkish sites, according to threat management firm RiskIQ. Called Energetic Bear, but also known as Dragonfly...
Continue reading
0 Comments