Monday, February 29, 2016

The World of Unknowns and the First Responder

The World of Unknowns and the First Responder: When it comes to known unknowns, there one fact you can be sure of – which is based on the conundrum of “am I being, or have I been hacked?”

DB Networks Honored as Best Data Center Security Solution for 2016 in 4th Annual Cyber Defense Magazine InfoSec Awards


http://www.prnewswire.com/news-releases/db-networks-honored-as-best-data-center-security-solution-for-2016-in-4th-annual-cyber-defense-magazine-infosec-awards-300227624.html

DB Networks Award-Winning Layer 7 Database Sensor Delivering Database Protection and Deep Visibility into Database Infrastructure will be Featured at RSA Conference 2016.
After many months of review and judged by leading independent information security experts, Cyber Defense Magazine selected DB Networks as a winner for its new Layer 7 Database Sensor solution. [....]

Cyber Defense Magazine Names Indegy Best Next Gen ICS/SCADA Security Solution for 2016 | Business Wire

Cyber Defense Magazine Names Indegy Best Next Gen ICS/SCADA Security Solution for 2016 | Business Wire



“Since we only recently emerged from stealth, we are very honored to be recognized with the Cyber Defense Magazine Award for Best ICS/SCADA Security Solution,” said Barak Perelman, CEO of Indegy. 

Saturday, February 27, 2016

How To Keep Your Android Phone Secure

How To Keep Your Android Phone Secure

As the number of threats is on the rise, Android platform is no longer safe, which isn't a surprise to anyone. 
Most of us are usually worried more about the security of our desktops or laptops and forget to think about the consequences our smartphones can make if compromised or stolen.[...]

Tuesday, February 23, 2016

GM Bot (Android Malware) Source Code Leaked Online

GM Bot (Android Malware) Source Code Leaked Online

The source code of a recently discovered Android banking Trojan that has the capability to gain administrator access on your smartphone and completely erase your phone's storage has been LEAKED online.[....]

Friday, February 19, 2016

How Just Opening an MS Word Doc Can Hijack Every File On Your System

How Just Opening an MS Word Doc Can Hijack Every File On Your System



If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it. 
Doing so could cripple your system and could lead to a catastrophic destruction.

Thursday, February 18, 2016

How To Convince Management You Need More People



CISOs stand a better chance of getting the resources they need if they establish proper performance metrics that show how information security supports and benefits business objectives and opportunities.[...] http://www.darkreading.com/careers-and-people/how-to-convince-management-you-need-more-people/d/d-id/1323803 via @DarkReading

Wednesday, February 17, 2016

Managing information security risks

Managing information security risks: Information security has always been important in the Oil & Gas sector but has not been given as much attention as political, safety, and environm...

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom: Cybersecurity incidents have significant impact beyond the IT organization, representing a significant risk to ongoing business continuity and reputation, and requiring heightened engagement across the entire executive team. Common wisdom is that security leaders need to speak in ways the business will understand, but what does that really mean? And how does the business side …

Tuesday, February 16, 2016

Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry | news.sys-con.com

Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry | news.sys-con.com.

Code Dx Receives Whirlwind of Accolades in Cybersecurity Industry

Recent Recognition in Forbes and Recipient of Three Awards in 2016 Validate Code Dx as a Cybersecurity Industry Innovator and Leader

European Commission - PRESS RELEASES - Press release - Security of gas supply regulation

European Commission - PRESS RELEASES - Press release - Security of gas supply regulation: European Commission - PRESS RELEASES - Press release - Security of gas supply regulation

Survey Finds Lack of Consensus on Cybersecurity Accountability

Survey Finds Lack of Consensus on Cybersecurity Accountability: To provide an accurate view of risk, companies should introduce pre-emptive and real-time methods such as monitoring all the traffic in its network

Research: Attackers Drained $103,000 Out of Bitcoin Wallets Protected by Passwords

Research: Attackers Drained $103,000 Out of Bitcoin Wallets Protected by Passwords: Research reveals that attackers exploited a vulnerability that allowed them to drain $103,000 out of password-protected Bitcoin wallets.



Security researcher Ryan Castellucci first presented on the vulnerability at DEF CON,one of Tripwire’s top 10 conferences in information security.[...]




$100 billion later, feds fumble on cybersecurity

$100 billion later, feds fumble on cybersecurity

Monday, February 15, 2016

Phishing Email Scam Targeting Airbnb Customers

Phishing Email Scam Targeting Airbnb Customers: Security researchers have identified a new phishing scam that is targeting customers of the popular accommodation booking site Airbnb.

Sunday, February 14, 2016

How Hospitals Are Working to Stop Data Thieves

How Hospitals Are Working to Stop Data Thieves: 2015 was the year of the health care security breach. Nearly 100 million electronic health records were compromised, according to a December 2015 IBM Security report, blowing away the number of data breaches that occurred in the computer services and financial sectors.

Russia Wants to Kick Foreign Tech Companies Out Of The Nation

Russia Wants to Kick Foreign Tech Companies Out Of The Nation

Friday, February 12, 2016

Six cybersecurity measures companies can't ignore in 2016

Six cybersecurity measures companies can't ignore in 2016: Business in the digital age means doing less on paper and more in cyberspace. Many can access work-related documents from anywhere whether it’s a mobile device or an actual desktop.

Monday, February 8, 2016

Why You Should Be Concerned About The Cybersecurity Information Sharing Act.



 Why You Should Be Concerned About The Cybersecurity Information Sharing Act

Why You Should Be Concerned About The Cybersecurity Information Sharing Act. I really do wish I understood why lawmakers seem so gung-ho on tearing apart technologies they don’t understand, and freedoms they hardly think about.[....]



Hackers behind Dyre Malware Busted in Police Raid

Hackers behind Dyre Malware Busted in Police Raid

The InfoSecond: Week Feb 7, 2016

The InfoSecond: Week Feb 7, 2016: Mobile security, drones and eagles. This week's InfoSecond examines the latest mobile security news and then looks to the skies for some developing trends

Friday, February 5, 2016

Cybersecurity much more than a compliance exercise

Cybersecurity much more than a compliance exercise

An overwhelming number of security executives view compliance as an effective strategy. But it’s not, and many CISOs need to rethink their priorities.[...]

How Hospitals Are Working to Stop Data Thieves

How Hospitals Are Working to Stop Data Thieves: 2015 was the year of the health care security breach. Nearly 100 million electronic health records were compromised, according to a December 2015 IBM Security report, blowing away the number of data breaches that occurred in the computer services and financial sectors.

Thursday, February 4, 2016

Managing Security Vulnerabilities and Risks

Managing Security Vulnerabilities and Risks: One of the best ways to deal with vulnerabilities is to look at them in context, but you need security tools that can provide that context first.

Cyber Risks: Three Areas of Concern for 2016

Cyber Risks: Three Areas of Concern for 2016: There are three areas of cyber risk that may be prevalent in 2016: board involvement and management, security budgets and security staff.

A Strategy Map for Security Leaders: Critical Capabilities for the New-School CISO

A Strategy Map for Security Leaders: Critical Capabilities for the New-School CISO: The strategy map for security leaders highlights the critical capabilities today's CISOs should have, ranging from technical prowess to people skills.

Latest Windows 10 May Have a Linux Subsystem Hidden Inside

Latest Windows 10 May Have a Linux Subsystem Hidden Inside 





































A Few Months Back, Microsoft impressed the world with 'Microsoft loves Linux' announcements, including, development of a custom Linux-based OS for running Azure Cloud Switch and selecting Ubuntu as the operating system for its Cloud-based Big [...]

eBay refuses to patch website flaw that can serve up malware

ebay-piclarge.jpg
The e-commerce giant confirmed it would not fix the flaw, which could allow an attacker to remotely run code in a user's browser. 
eBay will not fix a flaw in its website that could allow an attacker to serve malware to unsuspecting site users.

Russian Security Council official said that Russia’s new National Information Security Doctrine will be completed in 2016.

Russian Security Council official said that Russia’s new National Information Security Doctrine will be completed in 2016.

Read more: http://sputniknews.com/russia/20160204/1034195710/russia-information-security-doctrine.html#ixzz3zCkDddpf  




Cyber security

Monday, February 1, 2016

Perspective: What Will Be the Defining Cybersecurity Issues In 2016?

JD Supra Perspectives



































As data breaches and their related obligations and liability risks continue to pile up with every passing year, we asked attorneys writing on JD Supra to answer the question: What will be among the defining issues for cybersecurity in 2016?[.....]

Google Wants to Fly Drones Over Your Head to Deliver High Speed 5G Internet

Google Wants to Fly Drones Over Your Head to Deliver High Speed 5G Internet




 













Dutch Police Training Eagles to Take Down Rogue Drones

Dutch Police Training Eagles to Take Down Rogue Drones










































You may have seen number of viral entertainment videos on the Internet, titled: Hawk attacks Drone! Angry Bird takes down Quadcopter, and the best one… Eagle attack: Drone Kidnapped by two Eagles, ...showing eagles, not-so-natural predators, [...]

Facebook XSS could have allowed attackers to take over users’ accounts





 Facebook XSS could have allowed attackers to take over users’ accounts
The security expert Jack Whitton reported a critical XSS vulnerability to Facebook that could be exploited by hackers to take over users’ Facebook accounts. The researchers reported the flaw to Facebook in July 2015, and the company fixed the problem in just 6 hours.[...]

LinkedIn users targeted by hacking group

LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE