. home.aspx

TRENDING NEWS

home.aspx
   

    HOUSE PASSES TWO BILLS AIMED AT IMPROVING CYBERSECURITY FOR SMALL BUSINESSES

    Jul 17, 2019

    Two pieces of legislation passed in the House of Representatives Monday seek to improve cybersecurity practices at the Small Business Administration and help small businesses across the country defend themselves against cyber threats. The SBA Cyber Awareness Act, spearheaded by Rep. Jason Crow (D-Co...

    SECURITY TODAY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67236723

    CYBERSECURITY RECOMMENDATIONS FOR HEALTHCARE THAT WON'T BREAK THE BANK

    Jul 17, 2019

    The key to implementing healthcare cybersecurity best practices is to start small, according to Erik Decker, chief security and privacy officer for University of Chicago Medicine. A federal task group of cybersecurity experts and leaders spent two years working with healthcare organizations to craft...

    TECHTARGET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67246724

    NEW MALWARE SAMPLES RESEMBLE STRONGPITY

    Jul 17, 2019

    Researchers have said with high confidence that the publicly reported adversary dubbed StrongPity has been engaged in an unreported and ongoing malware campaign, according to research from AT&T Alien Labs. Threat actors are using the new malware and infrastructure to control compromised machines...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67296729

    75% OF SECURITY AWARENESS PROS ARE PART TIME

    Jul 17, 2019

    The 2019 Security Awareness Report published by SANS Security Awareness, a division of SANS Institute, found that across many organizations, there is an increased emphasis on the need for awareness and training programs. According to the report, more than 75% of those who are currently responsible f...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67306730

    AUSTRALIAN GOVERNMENT LAUNCHES NEW CYBERSECURITY NODE

    Jul 17, 2019

    In a bid to drive cybersecurity innovation and harness cybersecurity talent in the region, the New South Wales government and AustCyber have jointly launched the NSW Cyber Security Innovation Node at the harbor city’s Joint Cyber Security Centre. Announced in 2018, the new information security...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67316731

    AUTONOMOUS CARS: SAFETY OPPORTUNITY OR CYBERSECURITY THREAT?

    Jul 16, 2019

    It all started as science fiction, but the possibilities of autonomous cars gracing our roads are getting closer to reality by the day. Transport companies such as Uber and Tesla are already experimenting on cars that use computer operating systems to instruct their human drivers. Google’s dri...

    MACHINE DESIGN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67256725

    NEW CYBER-SECURITY COMPETITION FOR TERTIARY INSTITUTIONS LAUNCHED

    Jul 16, 2019

    A new cyber-security competition for students of tertiary institutions was launched on Tuesday (July 16) to encourage interest in the field, amid the dearth of talent in the field in Singapore and the mounting threat of online attacks. The Cyber Investigators' Challenge is a free one-day event, ...

    THE STRAITSTIMES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67126712

    NSW GOVERNMENT CYBER SECURITY POLICY COMPLIANCE CLOCK IS TICKING FOR AGENCIES

    Jul 16, 2019

    Unveiled late last year, the New South Wales Government’s new Cyber Security Policy is designed to improve the digital defences of all state government agencies. The problem, however, is that many remain confused about exactly what they need to do. Under the policy, agencies must provide a wri...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67136713

    SECURING SPACE: KASPERSKY TO GIVE COSMONAUTS CYBERSECURITY TRAINING

    Jul 14, 2019

    Kaspersky is proud to announce its new partnership with the Gagarin Research and Test Cosmonaut Training Center – the location in Star City where cosmonauts from all over the world prepare to go to space. As part of this collaboration, the company will hold special training for cosmonauts, as ...

    AL BAWABA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67106710

    HEALTHCARE ORGANIZATIONS TOO CONFIDENT IN CYBERSECURITY

    Jul 12, 2019

    According to a survey of 100 healthcare professionals from hospitals to physician group practices, more than half of respondents are highly confident in the cybersecurity of their patient portals. The State of Patient Identity Management report, published by LexisNexis® Risk Solutions, revealed ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67116711

    ATTACKS IN TURKEY USED EXCEL FORMULA INJECTION

    Jul 12, 2019

    Having tracked the activities of threat actors suspected of being involved in a large number of malicious spam attacks targeting organizations based in Turkey, Sophos researchers determined that the attackers flew under the radar using Excel formula injections to deliver the payload. “The thre...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67096709

    INSIDE THE NIST TEAM WORKING TO MAKE CYBERSECURITY MORE USER-FRIENDLY

    Jul 11, 2019

    Cybersecurity is usually not a user’s primary duty, yet they suffer an increasing burden to respond to security warnings, maintain many complex passwords, and make security decisions for which they are not equipped. This is the main reason why security needs to be usable and why the National I...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67046704

    OPERATORS CANNOT TURN A BLIND EYE TO CYBER SECURITY

    Jul 11, 2019

    Whilst investigating a cyber incident onboard a ship the USCG found that the security risk presented by the shipboard network was well known among the crew before the incident. In its recent Marine Safety Alert 06-19, the United States Coast Guard (USCG) shares its findings from an investigation int...

    MARINE LINK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67056705

    WHY CANNABIS BUYERS ARE UNIQUELY VULNERABLE TO CYBER ATTACKS

    Jul 11, 2019

    Experts in the field of cyber security say North America’s emerging cannabis industry—and its customers—could be especially vulnerable to hacks and extortion. Cities like Baltimore, as well as the state of Georgia’s court system, and Lake City, Florida, have been the recent t...

    LEAFLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67066706

    NINE WAYS CRYPTOS ARE BEEFING UP SECURITY

    Jul 11, 2019

    The bitcoin theft, from Taiwan-based Binance, was valued at around $40 million and part of a “large-scale security breach”, in which hackers used “a variety of techniques, including phishing, viruses and other attacks”, chief executive Changpeng Zhao said in a statement at th...

    RACONTEUR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66996699

    ARLINGTON INVESTIGATING CYBER ATTACK ON COUNTY PAYROLL SYSTEM

    Jul 10, 2019

    Arlington County has revealed a cyber attack that penetrated the county’s payroll system. In a statement, the county says a number of employees were impacted by the intrusion, but did not specify the exact number or impacts. The intrusion appears to be the result of a “phishing” em...

    ARLNOW
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67006700

    THIRD-PARTY RISK, BUG SUBMISSIONS UP FOR HEALTHCARE

    Jul 10, 2019

    Healthcare providers are finding it increasingly more difficult to assess and understand the risks posed by vendors, according to a new report released today by Censinet and the Ponemon Institute. The report, The Economic Impact of Third-Party Risk Management in Healthcare, surveyed 554 healthcare I...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66986698

    CYBER ATTACKS BIGGEST THREAT TO FINANCIAL SECTOR

    Jul 09, 2019

    Financial services organizations are suffering from an increased number of phishing attacks, according to a new report Mobile Security in the Financial Services, published by Wandera. Researchers analyzed 4.7 million events across the subset of devices over the 6-month period. For mobile alone, each...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66876687

    CYBERSECURITY’S WEAK POINT IS WORKERS’ EMAIL THREAT KNOWLEDGE

    Jul 09, 2019

    Employees in customer service and security industries have the worst cybersecurity email performance, with hospitality sector workers scoring the lowest in multiple categories, a new data security report has found. According to the report, released July 10 by California-based global online security ...

    COAST REPORTER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66886688

    PRO GLOBAL AND CSA LAUNCH CYBER AUDIT PRACTICE TO REDUCE INSURANCE EXPOSURE

    Jul 09, 2019

    Pro Global has launched Cyber Audit Practice in partnership with cyber security firm Cyber Security Associates (CSA) to mitigate the risk for the insurance sector, as news that British Airways faces a huge £183.39 million fine for breaching data protection law was revealed this week. The new p...

    INTELLIGENT INSURER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66896689

    THAILAND LEADS ASEAN INTO A SECURE DIGITAL FUTURE

    Jul 08, 2019

    Thailand’s Ministry of Foreign Affairs envisions ASEAN as ‘seamlessly connected’ and cybersecurity will contribute to that vision. As the chair country of ASEAN, Thailand aims to advance the community towards a future that includes a digital ASEAN. Based on that vision, Thailand ha...

    SECURITYBRIEF ASIA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66786678

    FORTINET HIGHLIGHTS RISE IN CYBER ATTACKS DESIGNED TO TARGET SCADA AND OTHER INDUSTRIAL CONTROL SYSTEMS

    Jul 08, 2019

    Fortinet has announced the findings of its 2019 Operational Technology Security Trends Report, analysing data gathered from millions of Fortinet devices to discern the state of cybersecurity for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). The analysis...

    CRN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66806680

    SOLVING THE CYBER SECURITY RIDDLE FOR WEALTH MANAGEMENT FIRMS

    Jul 08, 2019

    It seems sensible that the higher the value of an item, the better protected it will be.  Yet, when it comes to personal wealth management, this traditional logic does not always hold true. Why pretend you are a Nigerian Prince to thousands when you could enjoy a bigger jackpot by pretending to...

    BUSINESS MATTERS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66836683

    BIDDING FAREWELL TO OUTDATED CYBERSECURITY PRACTICES

    Jul 08, 2019

    The three pillars of cyber security protection which are identity, privilege and asset management – won’t ever lose importance. They have remained inalterable for the past few decades. However, other IT security suggestions have not been as deep seated, and have instead evolved to reflec...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66846684

    HOW WE MADE CYBERSECURITY PROFESSIONALS GIVE AWAY THEIR DATA – AT A CYBERSECURITY EXPO

    Jul 08, 2019

    The UK’s National Cyber Security Centre recently released a list of the 100,000 most common passwords. To say I cringed would be an understatement. 23.2 million accounts are still using ‘123456’ as a password, with people’s names, favourite football teams and favourite bands ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66856685

    HACKERS MAY GLEAN YOUR PASSWORD BY LISTENING TO HOW YOU TYPE ON YOUR PHONE

    Jul 07, 2019

    That’s the startling premise of a recent study by researchers at Cambridge University and Sweden’s Linköping University who were able to glean passwords by deciphering the sound waves generated by fingers tapping on smartphone touch screens. Malicious actors can decode what a person...

    THE DENVER POST
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66796679

    33% OF UAE RESIDENTS WANT AI TO LOOK AFTER THEIR CYBERSECURITY

    Jul 04, 2019

    While this figure is significantly higher than the average across those EMEA countries surveyed – where 26% of respondents said they would prefer AI to manage their cybersecurity – it lagged behind a preference for humans to complete the same task, with 47% of respondents in the UAE sayi...

    AFRICAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66696669

    DATA BREACHES – ARE ENTERPRISE CYBER DEFENCES FACING IN THE RIGHT DIRECTION?

    Jul 04, 2019

    The hacker-in-the-hoodie or the anonymous ‘Guy Fawkes’ mask have both become symbols synonymous with data breaches. Each one supports the common perception that breaches happen when outsiders with malicious intent somehow evade prevention and detection controls and steal sensitive data. ...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66706670

    APAC EXPERTS WEIGH IN ON CYBER SECURITY TRENDS

    Jul 04, 2019

    Hardly a day goes by without yet another organisation falling prey to a cyber attack or data breach that has led to reputational and financial losses. an unprecedented attack on its public healthcare IT systems that compromised the personal data of about 160,000 patients. The attack followed similar...

    COMPUTER WEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66716671

    SECURITY AND PRIVACY KEY TO SMART BUILDINGS AND CITIES

    Jul 04, 2019

    Network video supplier Axis Communications has published a whitepaper that details the benefits and challenges for smart buildings and smart city management, and highlights a methodology to address associated security risks. The Smart buildings & smart cities security whitepaper, produced in ass...

    COMPUTERWEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66726672

    GLOBAL CYBER SECURITY MARKET OVERVIEW BY TOP COMPANIES & SEGMENTATION

    Jul 03, 2019

    The Global Cyber Security Market report has the best advice on the subject of the comprehensive market.” The report deals with end customers to comprehend ongoing industry trends, Cyber Security industry growth, strategies, threats, cost, overview, manufacturing, and foresight trends, trading,...

    TECHNOLOGY NEWS STORE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66656665

    CYBERSECURITY SHOULD BE HANDLED BY LAW ENFORCEMENT AND GOVERNMENT, REPORT

    Jul 03, 2019

    A quarter (25%) of survey respondents feel cybersecurity should be the responsibility of law enforcement, and 28% feel it is down to the government, according to a report by Palo Alto Networks.  The study, which surveyed over 10,000 respondents in EMEA and UAE, explored the attitudes towards ne...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66686668

    THOUSANDS LEFT VULNERABLE IN NEXUS REPOSITORY

    Jul 02, 2019

    A recent breach in Nexus Repository left many companies and government agencies vulnerable, as thousands of private artifacts were left unprotected, according to a July 2 blog post from researchers Daniel Shapira and Ariel Zelivansky, with Twistlock Labs. While this breach was swiftly rectified, Sha...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66636663

    NZ FINALLY UPDATES ITS CYBERSECURITY STRATEGY, SO WHERE'S AUSTRALIA'S?

    Jul 02, 2019

    The New Zealand government has made good on its 2018 promise to refresh its national cybersecurity strategy and action plan, at least in part. The Cyber Security Strategy 2019 was published on Tuesday, but it's a brief document. Five of its 17 pages are the covers, copyright notices, glossary, a...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66646664

    INCREASING SECURITY BREACHES TO DRIVE INTRUSION PREVENTION MARKET: REPORT

    Jul 01, 2019

    The Intrusion Prevention System market is forecast to surpass $8.5 billion by 2025, after growing at a CAGR 13.7% during the forecast period 2019-2025, according to market research by IndustryARC. Increasing awareness among entities regarding cyber security and essential data protection practices ha...

    MONEYCONTROL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66586658

    LAWMAKERS SEEK IMPROVED CYBER SAFEGUARDS WITH IOT SECURITY BILL

    Jul 01, 2019

    With the explosion of IoT devices on the market, and an accompanying desire by the U.S. government to use those products to streamline operations and find efficiencies, a bi-partisan group of lawmakers is pushing a bill that would set minimum standards for built-in security on IoT devices that are t...

    CRN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66596659

    SMALL PROVIDERS STILL STRUGGLING WITH CYBERSECURITY, RISK MANAGEMENT

    Jul 01, 2019

    Small healthcare organizations are less likely to use cybersecurity policies than their larger counterparts, such as failing to hire a dedicated chief information security officer, according to a new report from CHIME and KLAS. Released on Friday, the white paper assesses the current state of health...

    HEALTH IT SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66606660

    A PEAK INTO SAFE-T’S ZERO TRUST ACCESS SOLUTION

    Jun 30, 2019

    Safe-T provides a secure application and file access solution with 1) An architecture that implements Zero Trust Access, 2) A proprietary secure access control channel that enables users granted appropriate permissions access to shared sensitive files and folders, and 3) User behavior analytics. Why...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66556655

    NEW DRIDEX VARIANT EVADING TRADITIONAL ANTIVIRUS

    Jun 28, 2019

    Only 10 days after malware researcher Brad Duncan reported analysis on a new variant of Dridex that bypasses mitigation of application whitelisting techniques by disabling or blocking Windows Script Host, eSentire discovered a new infrastructure pointing to a similar Dridex variant. “Dridex ma...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66536653

    CHINA HACKED EIGHT MAJOR COMPUTER SERVICES FIRMS IN YEARS-LONG ATTACK

    Jun 27, 2019

    Hackers working for China's Ministry of State Security broke into networks of eight of the world's biggest technology service providers in an effort to steal commercial secrets from their clients, according to sources familiar with the attacks. Reuters today reported extensive new details ab...

    THE HANS INDIA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66456645

    ENISA REINFORCED AS EU CYBERSECURITY AGENCY TO STEER NEW ACT

    Jun 27, 2019

    The EU Cybersecurity Act (CSA) comes into force from today, establishing an EU framework for cybersecurity certification under a reinforced and rebranded ENISA. Originally proposed in 2017 as part of a wide-ranging set of measures to deal with cyber-attacks and to build strong cybersecurity in the E...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66486648

    TEACHING NEXT-GENERATION CYBERSECURITY IS NCSU PROFESSOR’S GOAL

    Jun 27, 2019

    In recent years, computer hardware has faced an ever-evolving variety of cyberattacks that aim to access privileged information or take over a system’s operations. Unfortunately, academia has had trouble keeping pace, offering few – if any – courses that prepare students to make us...

    WRAL TECHWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66496649

    GULF CLASH & CYBER-ATTACKS, CONCERNS RISE FOR SECURITY IN US HOLY PLACES – BEYOND THE MATRIX

    Jun 27, 2019

    Rod Reuven Dovid Bryant and Jerry Gordon bring back Dr. Stephen Bryen to discuss the clash between the US and Iran over the downing in international waters of a US Navy MQ 4 Triton surveillance drone by Iranian air defense missiles. He questions the wisdom of disclosing the US retaliatory cyber-atta...

    THE JEWISH PRESS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66506650

    RECIPE FOR DISASTER AS TECH SUPPORT SCAMMERS USE PAID SEARCH

    Jun 26, 2019

    Tech support gangs have been spotted using paid search to reel in unsuspecting victims looking for food-related content online, according to Malwarebytes. The security vendor spotted scammers buying ads for Google and Bing which it said are designed to lure older netizens searching for food recipes....

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66436643

    STRINGENT CYBERSECURITY PROTOCOLS NEEDED TO PROTECT SMART CITIES

    Jun 26, 2019

    Smart cities across the UAE will be generating data at an unprecedented level, and this will necessitate stringent cybersecurity protocols being in place to protect valuable data, experts said. Highlighting the recent launch of the 'UAE National Cybersecurity Strategy', which will create saf...

    KHALEEJ TIMES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66446644

    SOCIAL ENGINEERING FORUM SUFFERS MAJOR BREACH

    Jun 25, 2019

    An online forum focused on discussion of all things social engineering has been breached, with the details of tens of thousands of account holders compromised. Social Engineered administrator “Snow101” explained to users in a post late last week that the hackers exploited a vulnerability...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66386638

    3 CYBERSECURITY LESSONS FOR E-COMMERCE WEBSITE ADMINISTRATORS

    Jun 25, 2019

    In large part, the security of an ecommerce company is the responsibility of its technical support team and ecommerce software vendors. In reality, cybercriminals often exploit the security illiteracy of the staff to hit a company. Of all the ecommerce team, web administrators are often targeted for...

    PACKT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66396639

    THE SECRET TO ISRAELI CYBERSECURITY INNOVATION AT TAU’S CYBER WEEK

    Jun 25, 2019

    Cybersecurity experts came together yesterday for a plenary session at Tel Aviv University’s 10th annual Cyber Week, where they discussed best practices for innovative solutions in security workplaces. The panel, titled “The Formula for Cyber Innovation,” was moderated by Dr. Yeniv...

    THE JERUSALEM POST
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66406640

    LEVEL 11 TECH ADVISER ROBERT WILLIAMS SHARES TIPS FOR ONLINE SECURITY

    Jun 25, 2019

    Robert Williams, the Chief Technology Adviser for Philippines-based digital and cyber-defence consultancy Level 11 Tech, has shared his tips on-line security basics. During a recent showcase event in Manila hosted by local IT services and consultancy Level 11 Tech, the firm’s Chief Technology ...

    CONSULTANCY.ASIA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66306630

    CYBERSECURITY FIRM TREND MICRO FINDS CRYPTO MALWARE ON ANDROID SOFTWARE

    Jun 24, 2019

    The “multinational cyber security and defense company” from Tokyo, Trend Micro, recently reported on a cryptocurrency mining bot that’s infecting Android devices, reports CoinDesk. Security threats are spread all over. According to Trend Micro, the malware is in 21 different countr...

    INSIDEBITCOINS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66266626

    INCOMPLETE FIX LEADS TO NEW KUBERNETES BUG

    Jun 24, 2019

    A new high-severity Kubernetes vulnerability has been discovered, according to security announcement on Securelists.org. As part of the ongoing Kubernetes security audit sponsored by the Cloud Native Computing Foundation, the Kubernetes product security team announced a new high-severity vulnerabili...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66286628

    MASSIVE DHS DATA BREACH RAISES QUESTIONS ABOUT OREGON’S CYBERSECURITY PROTOCOLS

    Jun 24, 2019

    A January data breach at the Department of Human Services exposed the confidential information of an eye-popping 645,000 Oregonians. Those people whose personal data was compromised were left with many questions. But the massive breach raised an even bigger question for everyone else: What are state...

    OREGONIAN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66296629

    OPTIV SECURITY CROWNED TOP PURE-PLAY SECURITY SOLUTIONS INTEGRATOR FOR THE THIRD YEAR IN A ROW

    Jun 23, 2019

    Optiv Security, a world class cybersecurity solutions integrator supplying end-to-end cybersecurity solutions, revealed that for the third consecutive year, it has been crowned as the top pure-play security solutions integrator on The Channel Company’s 2019 SP500. The SP500 is well-knownan yea...

    CLOUDWEDGE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66246624

    HOW IS DIGITAL TRANSFORMATION CHALLENGING THE SECURITY CHANGES?

    Jun 23, 2019

    Digital technologies are transforming the business world, and a larger number of companies have adopted the internet-of-things (IoT) devices to move their data into cloud environments for easier and safer access. The advent of these technologies has enabled firms to reimagine the traditional busines...

    ANALYTICS INSIGHT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66256625

    ARTIFICIAL INTELLIGENCE (AI) IN CYBER SECURITY MARKET PROSPECTS & GROWTH TRENDS RECORDED UNTIL 2026

    Jun 21, 2019

    Artificial intelligence (AI) is a result of a software that tries to create a decision mechanism similar to human brain’s decision mechanism. Artificial intelligence is playing a crucial role in cyber security by identifying threats and protecting organizations’ data from lethal cyber-at...

    THE WIRE NEWS NOW
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66216621

    BOTNETS SHIFT FROM WINDOWS TOWARDS LINUX AND IOT PLATFORMS

    Jun 20, 2019

    Continuous monitoring and research of botnets discovered significant changes taking place in the coding of malware used to create bots, operations, and maintenance of botnets and IP Chain-Gangs. Throughout 2018, NSFOCUS developed profiles on 82 IP Chain-Gangs, groups of bots from multiple botnets ac...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66166616

    CISOS STRUGGLING WITH 50+ SEPARATE SECURITY TOOLS

    Jun 20, 2019

    Organizations are struggling to gain real-time visibility into their security technologies and suffering from an excessive number of tools running across the enterprise, according to new research from Panaseer. The security monitoring firm polled 200 enterprise CISOs to better understand their key s...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66196619

    OPEN-SOURCE CYBERSECURITY TOOL TO ENHANCE GRID PROTECTION

    Jun 20, 2019

    A revolutionary new cybersecurity tool that can help protect the electric power grid has been released to the public on the code-hosting website GitHub. Developed by researchers at the U.S. Department of Energy’s (DOE) Idaho National Laboratory (INL), the Structured Threat Intelligence Graph (...

    T&D WORLD MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66206620

    SECURITY SHOULD BE BUSINESS FOCUSED, SAYS ISF

    Jun 19, 2019

    A security assurance program that focuses on business needs can help organizations meet the needs of business stakeholders, according to a new report released by Information Security Forum (ISF). The report, Establishing a Business-Focused Security Assurance Program, offers organizations ways to est...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66146614

    AMCA FILES FOR BANKRUPTCY PROTECTION AFTER BREACH

    Jun 19, 2019

    The parent company of healthcare debt collection firm American Medical Collection Agency (AMCA) has filed for bankruptcy protection following a major breach which is thought to have affected as many as 20 million patients. Its Chapter 11 filing in the Southern District of New York reveals the action...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66156615

    ATOS REACHES 3RD POSITION WORLDWIDE IN MANAGED SECURITY SERVICES FOR THE CYBERSPACE ACCORDING TO GARTNER

    Jun 14, 2019

    Atos, a global leader in digital transformation, today announces it has been ranked the 3rd global player in Managed Security Services (MSS) in terms of 2018 market share revenue, according to the latest Gartner report1. With a global team of over 5,000 security specialists and a worldwide network o...

    GLOBENEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66116611

    CYBER-SMART STRATEGIES FOR SMART BUILDINGS

    Jun 13, 2019

    Buildings are rapidly embracing digitization, and while the convergence of smart technologies and physical environments has greatly improved business operations and overall capabilities, this digitized method of operating has, in certain respects, led to increased potential vulnerabilities and attac...

    FACILITY EXECUTIVE MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66096609

    CROWDSTRIKE IPO SUCCESS PUTS SPOTLIGHT ON ENDPOINT SECURITY

    Jun 13, 2019

    Cybersecurity firm CrowdStrike made its successful Wall Street debut Wednesday. The company closed its trading with a share price of $58. Endpoint security vendor CrowdStrike raised more than $600 million in its initial public offering Wednesday. CrowdStrike shares closed at approximately $58 per sh...

    TECHTARGET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66106610

    AVIATION CYBER SECURITY MARKET OUTLOOK SEGMENTATION, GROWTH AND COMPETITIVE LANDSCAPE

    Jun 13, 2019

    Latest Industry Research Report On “Aviation Cyber Security – Industry Pipeline Insight, 2019” in-depth analysis of the market state and also the competitive landscape globally. “Aviation Cyber Security – Industry Pipeline Insight, 2019” – report offers comp...

    TRUTH DAILY MIRROR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66056605

    XSS IS MOST REWARDING BUG BOUNTY AS CSRF IS REVIVED

    Jun 12, 2019

    Cross-site scripting (XSS) is the most rewarding security vulnerability, according to data on the number of bug bounties paid. According to HackerOne’s top 10 most impactful security vulnerabilities, which have earned hackers over $54m in bounties and based on over 1400 HackerOne customer prog...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66066606

    CYBERSECURITY: NO LONGER JUST FOR REGULATED BUSINESSES

    Jun 12, 2019

    If you’re not already operating under some form of regulation, you soon will be. In fact, you probably are already, know it or not. But whether your business is highly regulated or not, your business is at risk and could benefit from taking a more security conscious approach. We all understand...

    ARKANSASBUSINESS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66006600

    CYBERSECURITY CO CYBER OBSERVER RAISES $8M

    Jun 12, 2019

    The Israeli company will use the funds to expand US operations and has established an office in Virginia. Israeli cybersecurity company Cyber Observer has raised $8 million in a Series B financing round led by Merlin International. The Caesarea-based company will use the funds to launch its North Am...

    GLOBES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66016601

    FLAW IN SYMCRYPT CAN TRIGGER DDOS

    Jun 12, 2019

    A vulnerability in the SymCrypt cryptographic library of Microsoft's OS can trigger a distributed denial-of-service (DDoS) disruption in Windows 8 servers and above, causing a perpetual operation "when calculating the modular inverse on specific bit patterns with bcryptprimitives!SymCryptFd...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66046604

    SECURITIES COMMISSION CONDITIONALLY APPROVES LUNO AS RECOGNISED MARKET OPERATOR

    Jun 11, 2019

    It’s a long time coming, but Malaysian crypto exchange Luno Malaysia Sdn Bhd (“Luno”) is a step closer to becoming a Recognised Market Operator. In a blog post, Luno revealed that the Securities Commission (SC) of Malaysia has conditionally approved the company’s application ...

    VERNONCHAN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65966596

    CSPI LAUNCHES CYBERSECURITY SOLUTION TO ADDRESS COMMERCIAL IOT SECURITY RISKS

    Jun 11, 2019

    CSPi (NASDAQ: CSPi), a provider of cybersecurity and packet capture products, managed IT and professional services and technology solutions, today announces a new approach to addressing the unique security challenges found in commercial Internet of Things (IoT) devices, especially in the medical (Io...

    GLOBENEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65996599

    ENSURE YOUR BUSINESS HAS CYBER SECURITY PROTECTION ONLINE

    Jun 10, 2019

    ENSURE YOUR BUSINESS HAS CYBER SECURITY PROTECTION ONLINE. It doesn’t matter how big or small your business, or what industry you work in, data breaches pose a real threat to all of us. In addition to monetary fines, a data breach can result in long-term reputational damage, business disruptio...

    BQ LIVE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65916591

    YOUR LINUX CAN GET HACKED JUST BY OPENING A FILE IN VIM OR NEOVIM EDITOR

    Jun 10, 2019

    If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim. Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE...

    THE HACKER NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65946594

    HACKERS CAN STEAL YOUR PASSWORDS, EMAILS, AND TEXTS BY LISTENING AS YOU TYPE ON YOUR SMARTPHONE

    Jun 10, 2019

    Hackers may be able to read whatever you type on a smartphone – by listening in via the device’s microphone. When humans tap on a touchscreen, they generate sound waves that are often strong enough to be picked up by the same device’s nearby microphone/s. Because each particular ch...

    JOSEPH STEINBERG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65956595

    CHECK POINT PARTNERS WITH SINGAPORE POLYTECHNIC TO STRENGTHEN CYBERSECURITY SKILLS IN SINGAPORE

    Jun 10, 2019

    Check Point Software Technologies Ltd., a provider of cyber security solutions globally, today announced that it will provide a comprehensive cybersecurity curriculum to Singapore Polytechnic as part of the Check Point SecureAcademy™ education program worldwide. As Singapore continues to trans...

    BACK END NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65896589

    NKITA HOSTS SESSION ON INCIDENT RESPONSE POLICIES FOLLOWING A CYBER SECURITY BREACH

    Jun 09, 2019

    Northern Kentucky International Trade & Affairs will host its next session on cybersecurity and incident response policies at C-Forward from 3:30 p.m. – 5:00 p.m. on Thursday, June 27. Frost Brown Todd attorney, Victoria Beckman, will present information about developing, implementing, and...

    NKYTRIBUNE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65906590

    COMMUNICATIONS IS A CRUCIAL ASPECT OF CRISIS MANAGEMENT AFTER A CYBER ATTACK

    Jun 07, 2019

    A carefully devised communication strategy is crucial to damage control following a cyber attack, according to Partner and Head of Brunswick South Africa’s Johannesburg office Marin Bidoli. Failure to manage communications in such a scenario only compounds the damage, she said at the ITWeb Sec...

    CONSULTANCY CO ZA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65866586

    SECURE STATE CYBER: THE IMPORTANCE OF ANTIVIRUS SOFTWARE AND CONTINGENCY PLANNING FOR VESSELS

    Jun 07, 2019

    The final article in our cyber risks series, produced in collaboration with Secure State Cyber, focuses on the benefits of antivirus software, the importance of contingency plans in the event of a cyber-attack and what actions Members can take to ensure good security practice on board their vessels....

    HELLENIC SHIPPING NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66546654

    FIND OUT HOW THREAT HUNTING HELPS IN PROACTIVELY COUNTERING CYBER ATTACKS

    Jun 06, 2019

    Threat hunting isn’t new, but the importance of its practical use in countering cyberthreats is recent.  We’ve seen that companies’ awareness of threat hunting is increasing over time. However, a lack of attention given to cyberthreats, arising out of budget, expertise and sta...

    BUSINESSWORLD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65826582

    FIRMS FACE TARGETED BESPOKE CYBER ATTACKS, DARK WEB STUDY REVEALS

    Jun 06, 2019

    Academic study exposes prolific availability and demand for tailored malware, network access and corporate espionage services, which suggests many firms’ cyber defences are below standard. There has been a 20% rise in the number of dark net listings that have the potential to harm the enterpri...

    COMPUTER WEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65856585

    IDENTIFY AND PROTECT YOUR VERY ATTACKED PEOPLE

    Jun 05, 2019

    Identify and protect your “very attacked people” (VAP) as attackers look for high value targets. Speaking at Infosecurity Europe in London, Paul Down, senior director of Proofpoint said that when attackers look to get information or money, a year ago they would do a mass email campaign a...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65816581

    CAR HACKING THREATENS VISION OF CONNECTED MOBILITY

    Jun 04, 2019

    When fraudsters targeted the Car2Go app-based vehicle-sharing service in Chicago in April, more than 70 vehicles were taken within a few hours. The vehicles were subsequently recovered, and it proved to be a case of fraudulent activity rather than a hack. Share Now, the joint venture between carmake...

    FT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65786578

    GLOBAL MOBILE SECURITY MARKET 2019-2028

    Jun 03, 2019

    The Global Mobile Security Market research report specifically captures the attention of different geographical regions such as Asia-Pacific, Latin America, Middle East, and Africa along with North America and Europe. Additionally, it brights up the present Mobile Security market scenario in company...

    THE CHEMICAL INDUSTRY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65736573

    LORCA ANNOUNCES ADDITIONS TO CYBERSECURITY PROGRAM

    Jun 03, 2019

    The London Office for Rapid Cybersecurity Advancement (LORCA) announced its third round of cybersecurity companies that will be joining its program to address the market need of industry today. The 15 "scaleups" responded to an open call and were invited to pitch their solutions to address...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65776577

    CYBERSECURITY MARKET 2019-2022 | TOP MANUFACTURES: SYMANTEC CORPORATION, PALO ALTO NETWORKS, FORTINET, FIREEYE, TREND MICRO INC., KPMG, IBM CORP

    May 31, 2019

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security — both are used by enterprises to protect against unauthorized access to data centers and othe...

    MARKET REPORTS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65696569

    CHECKERS AND RALLY'S VICTIMS OF DATA BREACH

    May 31, 2019

    On Wednesday, Checkers Drive-In Restaurants alerted customers that it had been dealing with a data security issue involving "malware at certain locations." On its website, the restaurant group announced that after discovering the issue, it "engaged leading data security experts to con...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65726572

    GLOBAL CYBER SECURITY OF SECURITY SERVICES MARKET 2019 MOVEMENTS BY TREND ANALYSIS, GROWTH STATUS, REVENUE EXPECTATION TO 2025

    May 30, 2019

    Cyber Security of Security Services Market 2019 report focuses on the global Cyber Security of Security Services new technology, size, share, future forecast, growth opportunity, key market, and key players. The report provides complete coverage on major industry drivers, restraints, and their impac...

    JUSTICE NEWS HERALD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65656565

    WHY USER IDENTITY IS BECOMING THE NEW SECURITY PERIMETER

    May 30, 2019

    Digitalisation has many advantages, from increasing productivity to improving accessibility. However, every technology has its downside, and with digitalisation this comes in the form of increased organisational risk. So while we all benefit from being able to access networks from any location via a...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65686568

    VISIBILITY, INTELLIGENCE AT THE HEART OF NEXT-GENERATION SECURITY

    May 29, 2019

    Cyber security experts say built-in intelligence and visibility are the hallmarks of the next generation cyber security technology. At the ITWeb Security Summit 2019 being hosted this week in Sandton, Johannesburg, a panel of experts led by Stefan van de Giessen, GM of cyber security, Networks Unlim...

    ITWEB
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65616561

    ESET EXPOSES TURLA MALWARE ATTACKS ON EUROPEAN DIPLOMATS

    May 29, 2019

    Turla, an infamous advanced persistent threat (APT) group, is using new PowerShell-based tools that provide direct, in-memory loading and execution of malware, executables and libraries. Researchers at ESET detected several attacks against diplomatic entities in Eastern Europe using PowerShell scrip...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65646564

    27-YEAR-OLD SEARCH MARKETING CEO LANDS 13-STOP U.S. SPEAKING TOUR

    May 29, 2019

    Garrett Mehrguth, the CEO and co-founder of the B2B and enterprise search marketing agency, Directive, recently was selected to speak at 13 stops of the Digital Summit tour. Digital Summit, the largest conference series in the digital marketing industry, has invited Mehrguth to share his unique pres...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66326632

    GERMANY SEEKS ACCESS TO ENCRYPTED MESSAGES ON WHATSAPP, TELEGRAM

    May 28, 2019

    Germany's federal interior minister, Horst Seehofer, wants companies such as WhatsApp and Telegram to give security authorities access to end-to-end encrypted messages or calls. Not complying with this could end with companies being banned by the Federal Network Agency. The latest issue of Der S...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65606560

    SEIZE THE CHANCE TO BOOST YOUR IT SECURITY SKILLS: SANS LONDON HAS PLENTY OF COURSES FOR YOU

    May 28, 2019

    Promo IT security training specialist SANS Institute is bringing a major event to London this summer, offering a bumper programme of intensive courses designed to arm security professionals with the skills they need to defend against database breaches and malicious attacks. Attendees have the chance...

    THE REGISTER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65556555

    AMID RISING CYBER THREATS, INDUSTRIAL FIRMS ARE DEPLOYING SECURITY STRATEGY AROUND IIOT: FROST & SULLIVAN

    May 27, 2019

    PRNewswire: The attacks on industrial systems and the industrial controls systems (ICS) architecture could range from physical impact, such as damage to the infrastructure, production downtime, loss of revenue, and hefty fines, to more severe consequences, such as injuries and even loss of life. In ...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65566556

    CANVA UNDER CYBER-ATTACK, WITH REPORTEDLY AS MANY AS 139 MILLION USERS AFFECTED

    May 27, 2019

    In a statement on the Canva website, the startup said it had notified the relevant authorities. “At Canva, we are committed to protecting the data and privacy of all our users and believe in open, transparent communication that puts our communities’ needs first,” the statement said...

    BUSINESS INSIDER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65516551

    MOZILLA PATCHED 16 SECURITY FLAWS WITH THUNDERBIRD 60.7

    May 26, 2019

    Mozilla has rolled-out the latest release of their Thunderbird email client with numerous security fixes. This month’s update carries the biggest number of security fixes amongst all previous Thunderbird releases in 2019. Allegedly, Thunderbird 60.7 brings patches for 16 different security fla...

    LATEST HACKING NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65526552

    CYBER SECURITY IN MANUFACTURING IS THE NEED OF THE HOUR, FEELS INDUSTRY

    May 23, 2019

    With digitalisation, Artificial Intelligence and smart working culture making inroads in various sectors, including manufacturing, Indian companies are also gearing up to cope with the problems that come along with the technological advancement. One such issue is of cyber security. There have been i...

    ELETS TECHNOMEDIA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65456545

    RANSOMWARE PROTECTION TIPS INCLUDE OFFLINE STORAGE, USER EDUCATION

    May 23, 2019

    Ransomware resilience continues to be important because the problem isn't going away. Explore these backup and education tips to help stay out in front of the issue. "It's always there." Jeff Martinson, IT director at Ameritas, is talking about ransomware. The problem may quiet dow...

    TECHTARGET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65466546

    6SENSE LAUNCHES ACCOUNT-BASED EXTERNAL MEDIA CAMPAIGNS ANALYTICS

    May 23, 2019

    Today 6sense, a leading Account Based Orchestration Platform, powered by AI, announced its External Media Campaigns feature. This capability extends 6sense's ability to track digital media campaigns launched on non-6sense platforms for use in account segmentation within the 6sense platform, and ...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67166716

    6SENSE LAUNCHES ACCOUNT-BASED EXTERNAL MEDIA CAMPAIGNS ANALYTICS

    May 23, 2019

    Today 6sense, a leading Account Based Orchestration Platform, powered by AI, announced its External Media Campaigns feature. This capability extends 6sense's ability to track digital media campaigns launched on non-6sense platforms for use in account segmentation within the 6sense platform, and ...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67176717

    FIRMWARE VULNERABILITY IN MITSUBISHI ELECTRIC

    May 22, 2019

    A vulnerability in Mitsubishi Electric’s MELSEC-Q Series Ethernet Module could allow a remote attacker to gain escalated privileges, according to an ICS-CERT advisory. Reported by Nozomi Networks, the vulnerability “could allow an attacker to render the PLCs statue in fault mode, requiri...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65436543

    GOOGLE STORED PLAINTEXT PASSWORDS SINCE 2005

    May 22, 2019

    Google has admitted that some of its enterprise customers’ passwords have been erroneously stored in plaintext, in a security issue dating back 14 years. The tech giant’s VP of engineering, Suzanne Frey, explained that the problem occurred when it introduced a new way for G Suite domain ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65446544

    PHISHING KIT 16SHOP TARGETS APPLE USERS, HACKERS

    May 21, 2019

    Researchers have discovered a hidden backdoor in a commercial phishing kit, 16Shop, used to attack Apple customers, according to Akamai. “When it comes to targeting Apple users and their personal and financial data, 16Shop has emerged as a go to kit for those who can afford it. While 16Shop is...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65376537

    LIB DEMS COME FIRST IN UK FOR CYBERSECURITY

    May 21, 2019

    Sweden’s political parties have the best cybersecurity posture globally, with the UK languishing in the bottom half of the table, according to a new analysis by SecurityScorecard ahead of the European Parliament elections. Noting the impact of a major data breach at the Democratic National Com...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65386538

    IT’S ALL ABOUT THE LOGS – LOOKING INTO YOUR PAST WILL PROTECT YOUR NETWORK’S FUTURE

    May 20, 2019

    We see it repeatedly. The newly installed CISO or CIO installs the latest blinky-box in “the quadrant.” As they discuss all the great features and how it’s going to help protect their network, it’s discovered that while the device will get MOST of the logs, but there are stil...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65296529

    NEW VERIZON DATA BREACH REPORT OUTLINES CHANGING CYBER THREAT LANDSCAPE

    May 20, 2019

    The new 2019 Verizon Data Breach Investigation Report (DBIR) provides a wealth of data and statistical research about where new cyber threats are coming from in the world, and how cyber criminals are altering their tactics in response to new defensive measures in place. The 12th annual Verizon data ...

    CPO MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65306530

    SINGAPORE GOVERNMENT LAUNCHES NEW CYBERSECURITY CENTER

    May 20, 2019

    The Maritime and Port Authority (MPA) of Singapore recently announced the launch of its new 24/7 cybersecurity center, Maritime Cybersecurity Operations Center (MSOC). Inaugurated by Niam Chiang Meng, the Chairman of the Maritime and Port Authority of Singapore (MPA), the new center is operated by S...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65326532

    BLOCKCHAIN, CRYPTOCURRENCY’S FUTURE DEBATED AT CONSENSUS CONFERENCE

    May 18, 2019

    If you are still confused about what blockchain is and what it can be used for, don’t worry. The crypto industry is still trying to figure that out, too. Here at Coindesk’s Consensus 2019 conference, fledgling software companies pitched new pieces for future incarnations of blockchain, w...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65216521

    BIOMETRIC TECHNOLOGY INDUSTRY: TREND OF INNOVATION ARRIVES, IMPLEMENTATION FOR NATIONAL SECURITY GAINS IMPORTANCE

    May 17, 2019

    Advances in biometric technology have transformed the conventional ways of identification and verification. Innovation has become a prime focal point for reducing the efforts of people with new ways for verification and ensuring the security. From voice biometric technology used for telephone bankin...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65236523

    MORE ORGS USE BOOBY TRAPS FOR COUNTERINTELLIGENCE

    May 17, 2019

    A recent survey found that to gain counterintelligence the vast majority of organizations would allow an attacker to take decoy files rather than stop an attack in progress, according to the latest International Cyber Benchmark Index from the Neustar International Security Council (NISC). A reported...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65206520

    NORWEGIAN INDUSTRY AND STATE MUST COMBINE TO COUNTER CYBER THREATS

    May 16, 2019

    Norway has been targeted by two large ransomware attacks in recent months – and public and private organisations must react in a coordinated way. Norway’s leading private and publicly owned companies are deepening their collaborative cyber defence relationship with national security agen...

    COMPUTER WEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65136513

    GROWING OPPORTUNITIES MAKE CYBERSECURITY A KEY FOCUS AREA FOR IT MAJORS

    May 16, 2019

    Cybersecurity may have always been a major risk managed on priority by IT majors, but growing opportunities in the space lately have led companies to sit up and take notice. Leading IT companies such as Infosys, TCS, Wipro and HCL Technologies have begun investing significantly in cybersecurity segm...

    MONEYCONTROL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65146514

    EXTREME NETWORKS’ APPROACH TO AUTONOMOUS NETWORKING IS ELEMENTAL

    May 15, 2019

    This week at its ExtremeConnect user event in Nashville, Tenn., Extreme Networks played the tune of autonomous networks. The theme of the event was FutureForward, indicating that the customers in the audience should be looking at many of the upcoming technology and business trends to architect their...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65066506

    IT DECISION-MAKERS WILLING TO SHARE THREAT INTEL

    May 15, 2019

    The sharing mentality is starting to take hold across the cybersecurity industry, with the vast majority of security decision-makers confessing that they would be willing to share threat intelligence, according to a new publication by IronNet. The report, Collective Offense Calls for Collective Defe...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65086508

    NEW PERFORMANCE BENCHMARK RANKS COMPANIES' CYBERSECURITY

    May 15, 2019

    Cyber Governance Indexes, a performance benchmarks software, provides market-based proof that companies with good cyber governance outperform peers in shareholder value terms – and vice versa. Five thousand companies are ranked at the beginning of each month from best to worst using real-world...

    SECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65116511

    GIT ATTACK HIT WEAK CREDENTIALS

    May 14, 2019

    The git community is working to triage an apparent ransomware attack that hit user accounts on GitHub, GitLab, and Atlassian Bitbucket. The attack was initially discovered on May 2. Reports suggested that the attack targeted accounts with weak passwords. According to a blog post released today by th...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65016501

    APAC FIRMS ON THE BACK FOOT IN CYBER SECURITY

    May 14, 2019

    Most Asia-Pacific organisations did not consider cyber security until after their digital transformation projects had begun, new survey finds In a worrying sign of complacency, more than 80% of Asia-Pacific organisations did not consider cyber security until after their digital transformation projec...

    COMPUTER WEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65026502

    CISCO ROUTERS OPEN TO MAJOR SECURITY FLAW

    May 14, 2019

    Cisco routers, including ones that can be found in malls, large companies or government institutions, are flawed in a way that allows hackers to steal all of the data flowing through them. The news was unveiled yesterday by Red Baron, a cybersecurity company whose researchers claim the Cisco 1001-X ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=65036503

    MICROSOFT SHAREPOINT VULNERABILITY EXPLOITED IN THE WILD

    May 13, 2019

    A critical vulnerability in Microsoft’s SharePoint collaboration platform has been exploited in the wild to deliver malware. The security hole, tracked as CVE-2019-0604, got its first patch in February and another one in March after the first fix turned out to be incomplete. Microsoft describe...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64906490

    WANNACRY REMAINS A GLOBAL THREAT TWO YEARS ON

    May 13, 2019

    WannaCry ransomware remains a global threat two years on from the initial outbreak of the attack in May 2017. That’s according to new analysis from Malwarebytes, which discovered that a total of 4,826,682 WannaCry detections have been identified since the malware variant first wreaked havoc. A...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64956495

    FORMJACKING: THE SECURITY NIGHTMARE CISOS NEED TO KNOW ABOUT

    May 13, 2019

    Ransomware hit the headlines in 2017, cryptojacking became notorious in 2018, so it may come as no surprise that a sophisticated new form of attack is making its mark in 2019. Staying ahead of trends and the security game, malicious actors have latched onto another high-return attack. Their latest w...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64966496

    HEALTHCARE IT PROS NOW CONFIDENT IN THEIR CYBER ATTACK RESPONSE ABILITY

    May 10, 2019

    Almost two years since the ransomware attack that brought the NHS (National Health Service) to a halt, healthcare IT professionals feel more confident in their ability to respond to a cyber-attack, according to new research from Infoblox. As healthcare providers continue to undertake digital transfo...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64856485

    PHOTO APP DEVELOPS TOOL WITH USER IMAGES

    May 10, 2019

    Photo storage app Ever failed to get consent from users who uploaded millions of images to the service before it adopted the images as tools to train a commercial facial recognition system, according to NBC News. Without disclosing their use of the images to users of the app, Ever also reportedly of...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64896489

    NORTHERN IRELAND GENERATING CYBER SECURITY KNOWLEDGE AND JOBS

    May 09, 2019

    Northern Ireland is establishing itself as an international hub of cyber security research and innovation, providing growing employment opportunities The cyber security industry in Northern Ireland provides employment for nearly 1,700 people and is on course to generate more than £70m in salar...

    COMPUTERWEEKLY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64836483

    DON'T NEGLECT YOUR CYBER HYGIENE: SIX STEPS TO KEEP INFORMATION SAFE

    May 09, 2019

    Just as you can't just show up to the dentist one time in your life and expect to prevent cavities forever, the same is true for cybersecurity. It should be a continuous process, not a one-time gap assessment or penetration test. Because new threats are emerging every day, businesses must contin...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64846484

    NATIONAL AWARENESS PLAN ON CYBER SECURITY, CYBER CRIME BY YEAR-END

    May 08, 2019

    A NATIONAL awareness plan on the management of cyber security and cyber crime will be launched at the end of this year, Deputy Prime Minister (DPM) Datuk Seri Dr Wan Azizah Wan Ismail said yesterday. She said the plan, which is being developed by the National Cyber Security Agency, is expected to be...

    THE MALAYSIAN RESERVE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64726472

    C-SUITE UNDER ATTACK AS MONEY AND DATA DRIVE BREACHES

    May 08, 2019

    State-sponsored attacks, cloud storage misconfiguration, ransomware and social threats targeting the C-suite all posed major risks to global organizations over the past 12 months, according to Verizon. The vendor’s newly released Data Breach Investigations Report 2019 comprises analysis of ove...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64776477

    DATA BREACHES IN THE CLOUD ARE MAINLY THE FAULT OF EMPLOYEES

    May 08, 2019

    When businesses use cloud services to store and manage data, they generally expect those services to handle data security, as well. However, a new report from Kaspersky Lab argues that in most cases, it’s the business’ employees that are to blame for data breaches. The comoants latest re...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64786478

    CANADIAN TELCO EXPOSES UNENCRYPTED CARD DETAILS

    May 08, 2019

    Canadian telco giant Freedom Mobile has become the latest big-name brand whose security has been found wanting after researchers discovered an unprotected database exposing over five million customer records. A research team at vpnMentor claimed to have discovered the Elasticsearch database online o...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64796479

    ETHICAL HACKERS: THE GOOD GUYS PROTECTING YOU BEFORE THE BAD GUYS STRIKEA

    May 08, 2019

    Ethical hackers are essentially the good individuals who put themselves in the shoes of a hacker to find out where an organisation’s vulnerability lies before shady elements strike Digital Transformation is a phenomenon that nearly every IT organisation that exists is onboard with it. When it ...

    DATAQUEST
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64706470

    INTERSECTING MACHINE LEARNING AND CYBERSECURITY

    May 07, 2019

    The technologies for Cyber Security and Machine Learning intersect in many ways. The objectives of cyber security technologies are to detect cyber-attacks, to thwart them, and—in case stopping an attack is not possible—monitoring system activities to detect an on-going attack before dama...

    ADVANCED SCIENCE NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64716471

    THE NATIONAL CYBER SECURITY ALLIANCE AND ITSPMAGAZINE ANNOUNCE PARTNERSHIP IN SUPPORT OF CYBERSECURE MY BUSINESS™

    May 07, 2019

    The National Cyber Security Alliance (NCSA) – a nonprofit, public-private partnership focused on helping businesses and consumers stay safer and more secure online – announced today a strategic partnership with ITSPmagazine. At the intersection of IT security and society, ITPSmagazine is...

    YAHOO FINANCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64666466

    CYBERSECURITY DRIVES INTELLIGENCE AGENCIES IN FROM THE COLD

    May 06, 2019

    Intelligence agencies and cybersecurity: What a long, strange trip it's been. Flash back to 2000, when Richard C. Schaeffer, then the U.S. Defense Department's director of information assurance, showed up to Def Con to pitch the hacking community on government employment. "We've got...

    BANKINFOSECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64646464

    MOZILLA RELEASES MAJOR SECURITY FIX FOR FIREFOX

    May 06, 2019

    Mozilla's latest patch for Firefox allows web extensions, themes, search engines and language packs to all be enabled again, the company confirmed over the weekend. In a short announcement, it said it wanted to get these bugs fixed before the start of the week. Initially, the problem was with th...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64656465

    RANSOMWARE: PREVENT YOUR COMPUTER FROM BEING INFECTED

    May 05, 2019

    The cities of Newark, Atlanta, and Sarasota have been hit. So have Cleveland's airport and San Francisco's transit authority. When the cyberattack targeted Leeds, Alabama, its mayor had no access to email, personnel files, or financial systems. This week on "60 Minutes," correspond...

    CBS NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64606460

    CANONICAL SHARPENS FOCUS ON RED HAT, VMWARE; IPO PLANS REMAIN

    May 03, 2019

    Canonical this week moved to simplify its service offerings in an attempt to lower cost and attract more customers looking to jump into the open source game. The move also comes ahead of a planned initial public offering that could handsomely compensate the company’s staff. The move is under i...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64586458

    JUNIPER PUSHES OPEN SOURCE PAST EXPERIMENTATION TO IMPLEMENTATION

    May 03, 2019

    Juniper Networks believes that open source is initiating where the broader software and networking industry is heading, Julius Francis, director of product management and marketing for cloud, security, and analytics at Juniper told SDxCentral at this week’s Open Infrastructure Summit. However,...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64596459

    UK BUSINESSES NEED TO STEP UP THEIR PASSWORD MANAGEMENT GAME

    May 02, 2019

    Despite doing a lot to keep their organisations safe, IT leaders are still falling short due to bad password practices. A new report by OneLogin found that almost all organisations in the country have some form of cybersecurity guidelines or best practices, and many IT decision makers are confident ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64526452

    HPE OPENS NEW HQ, HIGHLIGHTS LAB RESEARCH ADVANCES

    May 02, 2019

    Hewlett-Packard Enterprise, the HP that produces enterprise IT systems but not printers, laptops or workstations, showed off its new headquarters here in the heart of Silicon Valley on April 30. The event included a media tour of its wide-ranging research facilities. Among other projects, the tech g...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64536453

    SPLUNK EXTENDS POWER OF DATA TO ALL WITH NEW ENTERPRISE PRODUCTS

    May 02, 2019

    Splunk this week added two new products targeting non-technical workers that connect to its core enterprise data platform. One provides access to enterprise dashboards through a number of services, and the other is a data tool for business operations professionals to visualize certain processes. &ld...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64546454

    IBM OPENS ITS AUSSIE MULTI-ZONE AVAILABILITY REGION FOR CLOUD

    Apr 29, 2019

    Connecting three data centres in Sydney. IBM Australia’s new cloud boss Eric Schnatterly says the company’s multi-zone availability region (MZR) for cloud is now live in Sydney. IBM announced plans to deploy an MZR in Australia last June. Schnatterly will use his address at the Gartner I...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64306430

    THIRD-PARTY RISKS AND PHISHING ATTACKS ARE TOP OF BUSINESSES CONCERNS

    Apr 29, 2019

    Business leaders in the UK and the US are struggling to find the balance between cost and security, often making trades between business demands and security. This is according to a new report by Glasswall Solutions which says that almost three quarters (71 per cent) of respondents consider that thi...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64386438

    MOBILE VERSION OF CHROME VULNERABLE TO PHISHING ATTACKS

    Apr 29, 2019

    Researchers have detected a vulnerability in mobile version of Google's Chrome browser which can allow hackers to trick unsuspecting victims into thinking they are vising a legitimate website instead of a fake one. As you may imagine, if a person believes they are visiting their bank's websi...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64396439

    KASPERSKY LAB SURVEY FINDS CYBERSECURITY A TOP SOURCE OF STRESS FOR CONSUMERS IN NORTH AMERICA

    Apr 29, 2019

    Today, Kaspersky Lab released a new survey report, which revealed that 75% of people in the U.S. and Canada are stressed by the number of passwords they have to manage. The research also found that facing a cybersecurity incident is one of the most stressful situations modern consumers can face. Whe...

    BUSINESS WIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64406440

    HOW TO GET YOUR EMPLOYEES ON BOARD WITH CYBER SECURITY

    Apr 29, 2019

    Cyber attacks can put your company’s stability at risk as it usually targets the company computer systems. Having employees on board ensures you get all the assistance you can get in combating threats before they harm the system. Continuous training is one way of keeping all employees up to da...

    BANKING EXCHANGE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64416441

    CARBANAK MALWARE WAS RECORDING VIDEO OF VICTIMS' DESKTOPS

    Apr 26, 2019

    Researchers from FireEye spent hundreds of hours analyzing the Carbanak backdoor malware and its source code and were surprised by some of the features it contained. Following hundreds of hours analyzing the Carbanak malware and source code, security researchers found surprising features and complex...

    TECHTARGET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64426442

    QUALCOMM PATCHES MAJOR CHIP SECURITY FLAW

    Apr 26, 2019

    Qualcomm has patched a vulnerability in a few dozen chips which allowed hackers to steal sensitive information from the devices running them. The information included encryption keys and passwords, it was said. According to the announcement, the vulnerability which was given the name CVE-2018-11976 ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64316431

    CISCO FINDS SERIOUS FLAWS IN SIERRA WIRELESS AIRLINK DEVICES

    Apr 26, 2019

    Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. The security ho...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64326432

    NIST TOOL FINDS ERRORS IN COMPLEX SAFETY-CRITICAL SOFTWARE

    Apr 26, 2019

    The U.S. National Institute of Standards and Technology (NIST) this week announced that updates to its Automated Combinatorial Testing for Software (ACTS) research toolkit should help developers of complex safety-critical applications find potentially dangerous errors and make their software safer. ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64226422

    CYBERSECURITY IS IMPROVING, THOUGH RISK CONTINUES TO GROW

    Apr 26, 2019

    There is never a shortage of bad news when it comes to cybersecurity, with a seemingly endless stream of vulnerabilities and exploits. The 2019 Trustwave Global Security Report, released on April 25, has its' fair share of bad news as multiple types of attacks have grown and attackers have conti...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64286428

    P2P FLAWS EXPOSE MILLIONS OF IOT DEVICES TO REMOTE ATTACKS

    Apr 26, 2019

    Vulnerabilities discovered by a researcher in a peer-to-peer (P2P) system named iLnkP2P expose millions of cameras and other Internet of Things (IoT) devices to remote attacks from the Internet, and no patches are available. Paul Marrapese, a California-based security engineer, discovered two seriou...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64296429

    CONNECTED DEVICES, LEGACY SYSTEMS LEAVE HOSPITALS WIDE OPEN TO CYBER ATTACK

    Apr 25, 2019

    The spread of Internet-connected medical devices, combined with insufficient access controls, has helped enable a rapidly growing attack surface that's highly vulnerable to cyber attack. WHY IT MATTERS Those were among the findings of a healthcare security report published by network detection s...

    HEALTHCARE IT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64206420

    UK COULD BE SET FOR A MAJOR CYBERSECURITY UPGRADE

    Apr 25, 2019

    Consumers are bad at protecting themselves from online threats and that's probably the main argument why such a responsibility shouldn't be theirs to bear in the first place. Consequently, the UK government is considering building a national cybersecurity defence system, which should incorpo...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64216421

    CYBERSECURITY AND IOT INDUSTRY FACING SKILL SHORTAGE LEADING TO DEVELOPMENT ISSUES

    Apr 25, 2019

    Businesses in the UK are going through a tough phase while finding the correct blend of cybersecurity and IoT skills, according to a report by Experis Industry Insider. The study examines the growth of IoT and how it is impacting the cybersecurity jobs market. As the industry professionals witnessin...

    ANALYTICS INSIGHT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64146414

    6SENSE EXPANDS INTEGRATION WITH HUBSPOT FOR HEIGHTENED ACCOUNT BASED ORCHESTRATION

    Apr 25, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, announced $27 million in funding. The round was led by Industry Ventures and included participation from existing investors Bain Capital Ventures, Battery Ventures, Costanoa Ventures, Salesforce Ventures, and Venrock. “We b...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67186718

    CYBER SECURITY READINESS STALLS AS ATTACKS INTENSIFY, FINDS INSURER HISCOX

    Apr 24, 2019

    Global cyber security has “stalled” despite a sharp rise in attacks and soaring costs from the fall out, according to the Hiscox Cyber Readiness Report 2019. This lull in progress on cyber security has happened as attacks “reach a new intensity”, with more than three out of f...

    INTELLIGENT INSURER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64156415

    SHADOWHAMMER ATTACK DIDN'T JUST HIT ASUS

    Apr 24, 2019

    The Operation ShadowHammer supply chain attack which affected Asus last month may have affected more victims, Kaspersky has said. Further investigation by the company's security researchers found that Asus wasn't the only company targeted. In fact, a total of six companies were infiltrated d...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64116411

    REPORT: A VULNERABLE ATTACK SURFACE EXISTS IN HEALTHCARE ENTERPRISE IT NETWORKS

    Apr 24, 2019

    Vectra, the leader in network threat detection and response, today announced that the proliferation of healthcare internet-of-things (IoT) devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable attack surface that can be ...

    IT NEWS ONLINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64126412

    GOVERNMENT OFFICIALS TARGETED WITH TROJANIZED TEAMVIEWER

    Apr 24, 2019

    Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines. The attack started with a malicious XLSM document with malicious macros, which i...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64136413

    UNDERSERVED POPULATIONS UNAWARE OF CYBERSECURITY RISKS

    Apr 23, 2019

    Members of underserved populations are less likely to know whether they have even been victimized by a cyber attack, and they have lower awareness of cybersecurity risks. Partly as a result, they are also less likely to access vital online services, such as banking, health services, educational prog...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63946394

    SCIENTISTS MAY HAVE IDENTIFIED A NEW WAY TO IMPROVE NETWORK SECURITY

    Apr 23, 2019

    With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. Researchers at the U.S. Army Combat Capabilities Development Command’s Army Research Labora...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63956395

    UK FIRMS BEING HIT WITH MORE CYBERATTACKS

    Apr 23, 2019

    Businesses are ill-prepared for cyberattacks, and unsurprisingly, this means a higher percentage of companies have experienced attacks compared to last year. This is according to a new report by insurers Hiscox which says that 55 per cent of UK companies faced an attack this year, up from 40 per cen...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64016401

    CARBANAK SOURCE CODE DISCOVERED ON VIRUSTOTAL

    Apr 23, 2019

    The source code of a backdoor associated with the prolific FIN7 threat actor has emerged on VirusTotal alongside builders and other tools from the group, FireEye security researchers reveal. Also referred to as Carbanak, or Anunak, the financially-motivated actor has been active since at least 2015,...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64026402

    BANKING TROJAN DRIVE-BY DOWNLOAD LEVERAGES TRUST IN GOOGLE SITES

    Apr 23, 2019

    Brazilian hackers have developed a drive-by download attack leveraging the inherent trust in the Google name. A banking trojan known as LoadPCBanker is deployed using the file cabinets template in Google sites as a delivery vehicle. The attacker first developed a website using Google Sites. He then ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64036403

    EXPLOITS FOR ADOBE VULNERABILITIES SPIKED IN 2018

    Apr 23, 2019

    With Flash Player on way out, attackers are renewing their focus on Acrobat Reader, RiskSense found. Malware authors weaponized more Adobe software vulnerabilities in 2018 than any previous year while the actual number of newly disclosed security flaws in the company's products dropped significa...

    DARK READING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64046404

    CI SECURITY RAISES $9.6M TO HELP CUSTOMERS MANAGE CYBER THREATS

    Apr 23, 2019

    CI Security, a startup that provides its customers with cybersecurity software and expertise in detecting and responding to digital intrusions and threats, announced Monday it has raised $9.6 million in new funding. Seattle-based CI Security, which was previously known as Critical Informatics, says ...

    XCONOMY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64056405

    LEARN TO CURB CYBER SECURITY THREATS

    Apr 22, 2019

    RECENTLY, there have been many cyber security concerns involving scams and data breaches. It has become extremely vital to know how to protect your information more securely. This has prompted Asia Pacific University (APU) to address those concerns while demonstrating the university’s strength...

    THE STAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63846384

    DATA SECURITY SOFTWARE MARKET 2018 SWOT ANALYSIS: KEY MANUFACTURER, GROWTH BY SIGNIFICANT CAGR BY 2023

    Apr 22, 2019

    The report elaborates the complete details covering product definition, product type, and application. The report covers useful details which are categorized based on Data Security Software production region, major players, and product type which will provide a simplified view of the Data Security S...

    APPWEBRADAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63856385

    GOVERNMENT AND TELECOMS MEETING UP OVER GOOGLE'S NEW CHROME VERSION

    Apr 22, 2019

    So Google is allegedly working on an encrypted version of its popular internet browser Chrome, and this has raised eyebrows of more than one government agency and telecom operator in the UK. The news first broke out in The Times, which claims Google is building an encrypted version of Chrome. That w...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63916391

    CLOUD SECURITY IMPROVING: RESULTS OF THE 2019 SANS STATE OF CLOUD SECURITY SURVEY

    Apr 22, 2019

    The state of cloud security is improving, albeit slowly, according to results of the 2019 SANS State of Cloud Security survey to be released by SANS Institute on May 1, 2019. "Organizations are continually evolving in their use of cloud services, looking to the cloud for procurement, management...

    IT NEWS ONLINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63926392

    HEALTHCARE FIRM EMCARE SAYS 60,000 EMPLOYEES AND PATIENTS EXPOSED IN BREACH

    Apr 22, 2019

    Dallas, Texas-based firm EmCare Inc disclosed on Saturday that a number of employees' email accounts had been accessed, potentially exposing personal information of almost 60,000 people, including 31,000 patients. EmCare, part of Envision Healthcare, provides outsourced physician services to hos...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63936393

    BLOCKCHAIN PATENT GRANTED TO CYBERSECURITY COMPANY OWNED BY U.S. DEFENSE CONTRACTOR

    Apr 21, 2019

    Documents published by the United States Patent and Trademark Office (USPTO) on April 16 reveal that Texas-based cybersecurity company Forcepoint has been awarded a blockchain-related patent. Forcepoint is owned by U.S. defense contractor Raytheon and private equity firm Vista Equity Partners, and C...

    COINTELEGRAPH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63836383

    CISCO DISCLOSES CRITICAL SECURITY ALERTS FOR OS, ROUTERS

    Apr 19, 2019

    Cisco issued 31 security advisories and alerts over the past few days affecting, among other products, routers, operating systems, and LAN software. The vendor classified two as critical-impact vulnerabilities, six as high-impact, and 22 as medium. These new security alerts come about a month after ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63826382

    ELECTORAL COMMISSION SPINS UP CYBER OPS CENTRE

    Apr 18, 2019

    Looks to ex-cyber spooks to protect electoral systems. With the date of next month’s federal ballot now set, the agency in charge of Australia’s electoral systems has switched on its new security operations centre to protect against external interference. The short-term SOC capability wa...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63616361

    STATE-SPONSORED HACKERS USE SOPHISTICATED DNS HIJACKING IN ONGOING ATTACKS

    Apr 18, 2019

    With growing concern over DNS manipulation attacks, details on a new elite state-sponsored DNS hijacking campaign have been released. Called operation Sea Turtle, researchers believe that at least 40 different organizations across 13 countries have been compromised. Researchers at Cisco Talos discov...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63716371

    RUSSIAN HACKERS USE RATS TO TARGET FINANCIAL ENTITIES

    Apr 18, 2019

    A financially motivated threat actor believed to speak Russian has used remote access Trojans (RATs) in attacks on financial entities in the United States and worldwide, Israel-based security firm CyberInt reports. Tracked by the research community as TA505, the Russian threat group is known for the...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63726372

    AUTOMOTIVE CYBER SECURITY: GLOBAL MARKET INSIGHT REPORT 2019 TO 2027

    Apr 18, 2019

    The "Global Automotive Cyber Security Market Analysis & Trends - Industry Forecast to 2027" report has been added to ResearchAndMarkets.com's offering. The Global Automotive Cyber Security Market is poised to grow strong during the forecast period 2017 to 2027. Some of the prominen...

    PR NEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63736373

    WHY HP HAS TAKEN THE PC SECURITY LEAD

    Apr 18, 2019

    Hewlett-Packard Inc. has the world's leading security feature for personal computers at the moment. That was my conclusion based on this week’s announcement from the Innovation Summit in Barcelona (I was there) of updates to its market-leading Sure View and the announcement of Sure Sense. ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63746374

    LINKEDIN DATA FOUND IN UNSECURED DATABASES

    Apr 18, 2019

    A security researcher identified eight unsecured databases that held "approximately 60 million records of LinkedIn user information." GDI Foundation, where the security researcher is from, is a nonprofit organization with a mission to "defend the free and open Internet by trying to ma...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63756375

    CISCO TALOS SAYS A NATION STATE IS BEHIND SEA TURTLE DNS HIJACKING ATTACKS

    Apr 17, 2019

    Cisco Talos researchers say a nation state is likely behind a new cyberattack, dubbed Sea Turtle, that uses domain name system (DNS) hijacking to steal credentials and passwords for espionage. While Talos won’t attribute the attacks to one particular nation state, “given the complexity i...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63816381

    3 QUESTIONS TO ASK BEFORE PUTTING A HEALTHCARE APPLICATION IN THE CLOUD

    Apr 17, 2019

    Several years ago, many experts were indicating that by 2020 everything would be running in the cloud. The promises of economical on-demand computing and storage resources were appealing. Companies could look to reduce capital investments and begin to sunset expensive data centers by quickly spinnin...

    HEALTHCARE IT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63626362

    NATION-STATE ATTACKERS EXPLOITING DNS AT SCALE, CISCO REPORTS

    Apr 17, 2019

    Cisco Talos is warning of a new attacker group it has dubbed "Sea Turtle" that is exploiting DNS information at scale across large government agencies. According to the report which was released on April 17, the Sea Turtle attack has already compromised at least 40 different organizations,...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63636363

    ORACLE RELEASES 297 FIXES IN APRIL 2019 CRITICAL PATCH UPDATE

    Apr 17, 2019

    Oracle this week announced the release of 297 new security fixes as part of its April 2019 Critical Patch Update (CPU), two-thirds of which are remotely exploitable without authentication. Fifty-three of the fixes patch critical vulnerabilities — with a CVSS score of above 9 — including ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63516351

    HOW BLACKBERRY HAS BECOME A CYBER-SECURITY PLAYER

    Apr 16, 2019

    BlackBerry is a very different company today than it was a decade ago, as the one-time mobile giant is now firmly positioning itself to be a global player in the cyber-security market. Among the new assets in the BlackBerry security portfolio is Cylance, which BlackBerry acquired in a $1.4 billion d...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63526352

    CROSS-PLATFORM ROOTKIT AND SPYWARE HITS TARGETS WORLDWIDE

    Apr 16, 2019

    The Scranos rootkit-enabled spyware operation has expanded reach outside of China to hit targets worldwide, Bitdefender security researchers warn. Spreading via trojanized applications posing as cracked software or legitimate programs (such as e-book readers, video players, drivers, or anti-malware ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63536353

    HP AIMS TO SECURE ITS PC PORTFOLIO WITH SURE SENSE MALWARE BLOCKER

    Apr 16, 2019

    HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company's new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware. HP says Sure Sense is different from other m...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63546354

    F-SECURE REPORT HIGHLIGHTS THE WOEFUL STATE OF INSECURITY IN THE ENERGY INDUSTRY

    Apr 16, 2019

    It is the most important industry in the world. Energy. We need it. Without it, nothing works. Without the oil producers and refiners, there’s no petrol to fuel our cars. Without power plans and the supporting infrastructure, there’s no electricity to keep the lights on. Without natural ...

    TNW
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63556355

    NATIONAL GROUP SEEKS POLICYMAKERS, INTERNET OF THINGS INDUSTRY LEADERS TO JOIN SECURITY ACTION COMMITTEE

    Apr 16, 2019

    The Canadian Multistakeholder Process to enhance Internet of Things (IoT) security has a game plan to secure Canada’s connected future and will form an action committee to put it in play on April 18 in Ottawa. In April 2018, the Internet Society and the Ministry of Innovation, Science, and Eco...

    BUSINESS WIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63646364

    INNOVATIONS IN ENDPOINT SECURITY, ARTIFICIAL INTELLIGENCE, MACHINE LEARNING- AND IOT-BASED SECURITY

    Apr 16, 2019

    This Cyber Security TechVision Opportunity Engine (TOE) provides a snapshot on emerging cyber security solutions powered by artificial intelligence, machine learning, IoT, and endpoint security innovations that help protect companies from threats, data breaches, phishing attacks and defend against m...

    BUSINESS WIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63656365

    6SENSE SECURES $27 MILLION TO ADVANCE BOLD VISION IN B2B AND ABM

    Apr 16, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, announced $27 million in funding. The round was led by Industry Ventures and included participation from existing investors Bain Capital Ventures, Battery Ventures, Costanoa Ventures, Salesforce Ventures, and Venrock. “We b...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67196719

    EUROPEAN SOCIETY OF CARDIOLOGY PAPER CALLS FOR AN INTEGRATED APPROACH TO DIGITAL HEALTH

    Apr 15, 2019

    Patients, clinicians and technology vendors must work together to drive the adoption of digital health at the heart of national models and systems, researchers say. The potential of digital health to provide a comprehensive framework for the research, prevention and treatment of chronic disease is b...

    HEALTHCARE IT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63356335

    WIPRO HACKED, INTERNAL SYSTEMS USED TO ATTACK CUSTOMERS: REPORT

    Apr 15, 2019

    Wipro is currently investigating what appears to be a serious breach of its networks and systems, which are apparently being used to launch attacks on customers, forcing the outsourcing giant to build a private email service to replace compromised corporate system. First reported by United States se...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63416341

    THREE WORDPRESS PLUGINS 0DAY VULNERABILITIES UNCOVERED, THOUSANDS COMPROMISED

    Apr 15, 2019

    The more moving parts a website has, the more potential vulnearbilities and entry points it may have, also. This is particularly true with WordPress, whose platform revolves, in good measure, around different plugins. Each plugin is a potential disaster waiting to happen, and the bigger the userbase...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63426342

    MICROSOFT'S CLOUD EMAIL BREACH IS A CAUSE FOR CONCERN

    Apr 15, 2019

    Microsoft has admitted that it suffered a data breach involving its web-based email services including Outlook.com, MSN.com and Hotmail.com that lasted for three months before it was detected and remediated. Microsoft has not fully publicly disclosed how many customer accounts were impacted, and the...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63436343

    HEALTHCARE CYBER SECURITY MARKET TO ACCRUE $12.46 BILLION, BY 2023

    Apr 15, 2019

    According to the report published by Allied Market Research, the global healthcare cyber security market garnered $5.21 billion in 2017 and is expected to accrue a sum of $12.46 billion by 2023, growing at a CAGR of 15.6% from 2017 to 2023. The report provides a thorough analysis of market size and ...

    GLOBENEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63446344

    FOUR ELEMENTS OF AN EFFECTIVE CYBERSECURITY PLATFORM FOR SMALL BUSINESS OWNERS

    Apr 15, 2019

    Has your small or midsize business finally decided to bite the bullet on cybersecurity preparedness by adopting software to protect the firm’s sensitive information? If so, the key task for you now is to determine whether these new cybersecurity protections are, in fact, working. After all, da...

    FORBES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63456345

    IBM: 77% OF ENTERPRISES DON’T HAVE A CYBERSECURITY INCIDENT RESPONSE PLAN

    Apr 12, 2019

    The majority of companies — 77% of respondents — don’t have a cybersecurity incident response plan applied across the enterprise, according to a study conducted by the Ponemon Institute and paid for by IBM. One of the primary reasons for this is the well-documented security skills ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63316331

    VERSA RELEASES CLOUD-MANAGED SD-WAN BRANCH AND SECURITY

    Apr 12, 2019

    Versa Networks released a cloud-managed SD-WAN branch and security service designed for managed service providers and mid-market enterprises. Alongside the Versa Titan offering, it released Versa Cloud Services Gateway, a series of appliances that provide security and SD-WAN. In conversation at MWC ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63326332

    MAJOR VULNERABILITIES FOUND IN NEW WI-FI STANDARD

    Apr 12, 2019

    The latest WPA3 WiFi security and authentication standard may be suffering from serious safety flaws of its own.  This is according to a group of researchers - Mathy Vanhoef and Eyal Ronen, who issued a report called “Dragonblood – A Security Analysis of WPA3’s SAE Handshake&r...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63346334

    IOT SECURITY STARTUP ARMIS RAISES $65 MILLION SERIES C

    Apr 11, 2019

    IoT security startup Armis raised $65 million in Series C funding, bringing the company’s total to $112 million. Sequoia Capital led the round, with participation from Insight Venture Partners and Intermountain Ventures. Bain Capital Ventures, Red Dot Capital Partners, and Tenaya Capital also ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63216321

    SECURITY COLLIDES WITH MULTI-MILLION DOLLAR SD-WAN MARKET

    Apr 11, 2019

    It shouldn’t come as a shock that the SD-WAN market is hot right now. It brought in $700 million in 2018 and is projected to hit $17 billion in 2025, according to Global Market Insights. IHS Markit recently found that during the fourth quarter of 2018, the SD-WAN market grew 26% from the previ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63226322

    INVESTORS ARE BETTING EARLY ON CYBERSECURITY STARTUPS

    Apr 11, 2019

    In an increasingly digital world, startups, small businesses, and large corporations have at least one problem in common: ensuring the security of the data they store. We also know that security is top of mind for VCs, too—but likely more for the returns than the actual protection. According t...

    CRUNCHBASE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63246324

    NEW CYBER SECURITY TRAINING PLATFORM FROM BOXX INSURANCE TURNS YOUR EMPLOYEES INTO A HUMAN FIREWALL

    Apr 11, 2019

    Strong cyber security is often associated with anti-virus protection and expensive security technology. But the weakest link is not software or hardware, it's human beings. Recent evidence shows that employee behaviour—be it clicking on a malicious link, or poor password safety—is re...

    GLOBENEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63256325

    U.S. ATTRIBUTES NEW TROJAN TO NORTH KOREAN HACKERS

    Apr 11, 2019

    Notorious North Korean hackers are using a new Trojan in their attacks, the United States Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned on Wednesday. Referred to as Lazarus, BlueNoroff, and Hidden Cobra and said to be backed by the North Korean government, th...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63306330

    SAP PATCHES HIGH SEVERITY FLAWS IN CRYSTAL REPORTS, NETWEAVER

    Apr 10, 2019

    SAP this week released 6 Security Notes as part of its April 2019 Security Patch Day, including two that address High severity flaws in Crystal Reports and NetWeaver. Tracked as CVE-2019-0285 (CVSS Base Score: 7.5), the vulnerability in Crystal Reports is an information disclosure issue that could p...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63236323

    SYSDIG UNIFIES SECURITY AND MONITORING FOR CONTAINERS, MICROSERVICES

    Apr 10, 2019

    Sysdig this week released version 2.0 of its cloud-native security and visibility platform. The update unifies the aspects of its platform for a more complete view of the health, performance, and risk levels of an enterprises’ cloud-native applications. “It starts with a simple fact &mda...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63116311

    CARS EXPOSED TO HACKER ATTACKS BY HARDCODED CREDENTIALS IN MYCAR APPS

    Apr 10, 2019

    Hardcoded admin credentials found in the MyCar Controls mobile applications could have been exploited to locate and gain physical access to a vehicle. A small aftermarket telematics unit from Montreal, Canada-based AutoMobility, MyCar provides users with a series of smartphone-controlled features fo...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63126312

    VERIZON LAUNCHES PATCH FOR ROUTER VULNERABILITY

    Apr 10, 2019

    Out of all possible vulnerabilities the hardware we use on daily basis may have, the ones which allow hackers a full takeover of the device is probably the one which sounds most ominous. Well, one of these vulnerabilities, dubbed CVE-2019-3914, was discovered late last year in the Fios Quantum Gatew...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63136313

    GOOGLE BOOSTS CLOUD SECURITY, TRANSPARENCY AND IDENTITY

    Apr 10, 2019

    The way Google sees it, one of the primary ways to grow cloud adoption is by increasing trust and security in the cloud. At its Google Next event on April 10, Google announced new and enhanced services that look to improve security in the cloud as well as provide better security and transparency of ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63156315

    YOUR HOTEL CHECK-IN CONFIRMATION COULD BE PUTTING YOU AT RISK

    Apr 10, 2019

    When your hotel automatically emails you your booking information, there's a good chance that you're not the only person with access to those documents. Symantec, a security company, found flaws on hundreds of hotel websites, which were leaking sensitive information like names, phone numbers...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63016301

    MICROSOFT WIDENS UK CLOUD REACH

    Apr 09, 2019

    Microsoft has announced new Azure Availability Zones in the UK, pushing its cloud service even further in the country and offering increased compute capacity. Announcing the news in a blog post, the company says this now increases its Azure regions by more than double in the UK, and its compute capa...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63026302

    NEW GRAB-AND-GO STEALER IS MAKING WAVES

    Apr 09, 2019

    Researchers suspect that a new stealer malware dubbed Baldr, first detected in January, has incorporated three known threat actors, according to Malwarebytes. In today's blog post, researchers said that Baldr has earned positive reviews on Russian hacking forums for its use of three threat actor...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63036303

    GOOGLE CLOUD MOVES INTO DATA CENTERS, AWS, AND MICROSOFT AZURE WITH ANTHOS

    Apr 09, 2019

    Google today moved into on-premises data centers and across clouds — including competitors Amazon Web Services (AWS) and Microsoft Azure — with Anthos, its hybrid-cloud platform. “If you are using multiple cloud environments, Anthos is the choice for you,” said Google CEO Sun...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63046304

    NATIONAL CYBERSECURITY CENTER AND SPACE ISAC PARTNER TO BOOST CYBERSECURITY

    Apr 09, 2019

    The National cybersecurity solutions provider Kratos Defense & Security Solutions recently announced its partnership with the Space Information Sharing and Analysis Center (Space ISAC), which was unveiled at the 35th Space Symposium in Colorado Springs. Kratos is a technology-focused, mid-sized ...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63056305

    TENABLE DISCLOSES VERIZON FIOS ROUTER VULNERABILITIES

    Apr 09, 2019

    Millions of homes across America have Verizon's Fios Quantum Gateway router as their primary conduit to the internet, and many of them could be at risk, according to new research from security firm Tenable. On April 9, Tenable publicly disclosed that it was able to find multiple vulnerabilities ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=63146314

    JUNIPER BETS ON THE ENTERPRISE WITH CLOUD-DELIVERED SD-WAN

    Apr 08, 2019

    Juniper today released a cloud-delivered version of its SD-WAN service to simplify adoption and operations. It also leverages the recent $405 million acquisition of Mist Systems, which closed last week, to add visibility into both wired and wireless via its Contrail Service Orchestration platform. P...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62916291

    WORLD ECONOMIC FORUM RELEASES REPORT ABOUT BLOCKCHAIN CYBERSECURITY

    Apr 08, 2019

    The World Economic Forum (WEF) released a report about blockchain cybersecurity on April 5. The report points out that most data breaches do not result from the level of skill of the hackers, but instead happen because appropriate security measures often are not implemented. The WEF further claims t...

    COINTELEGRAPH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62926292

    SECURITY RESEARCHERS DISCOVER IOS VERSION OF EXODUS ANDROID SPYWARE

    Apr 08, 2019

    Security researchers have discovered the iOS counterpart of a dangerous Android spyware strain that was seen earlier this year on the official Google Play Store. The good news, according to security researchers from cyber-security firm Lookout, is that the iOS version is less sophisticated than the ...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62936293

    90 PERCENT OF SINGAPORE BUSINESSES SUFFERED DATA BREACHES LAST YEAR: REPORT

    Apr 08, 2019

    A recent research stated that cyber-attacks are increased in the last 12 months, causing security breaches affecting 96 percent of organizations surveyed. According to the research report from endpoint security firm Carbon Black, 90 percent of the Singapore businesses have been breached in 2018. In ...

    CISO MAG
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62946294

    TELCO SYSTEMS OFFERS UCPE WITH VMWARE-VELOCLOUD SD-WAN

    Apr 08, 2019

    Telco Systems today announced that it will offer an open universal CPE (uCPE) pre-integrated with the VMware VeloCloud-based SD-WAN service. This new offering will allow service providers to deploy the VMware SD-WAN services on their hardware of choice. The offering is part of Telco Systems NFVTime ...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62956295

    THIRD PARTIES LEAK DATA ON 540 MILLION FACEBOOK USERS

    Apr 04, 2019

    Over half a billion personal Facebook records have been publicly exposed to the internet by two third party app developers, according to researchers at UpGuard. The security company claimed in a blog post on Wednesday to have found the two datasets stored in Amazon S3 buckets, configured to allow pu...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62816281

    CONSUMERS ON BOARD WITH SECURING HEALTH RECORDS

    Apr 04, 2019

    As the healthcare industry continues to struggle with tightening up its cyber-defenses, consumers increasingly believe they play a role in securing their health information, according to a new report published by Morphisec. The 2019 Consumer Healthcare: Cybersecurity Threat Index asked more than 1,0...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62846284

    CYBER-ATTACK ON BAYER SHOWS NO SIGNS OF DATA THEFT

    Apr 04, 2019

    As accusations of nation-state attacks from the Chinese government are becoming more prevalent, Bayer, Germany’s largest drugmaker, announced that it has managed to contain what appears to have been a cyber-attack from China, according to Reuters. The attack, which was initially reported by Ge...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62856285

    A SPOT OF RANSOMWARE HITS ARIZONA'S TEA

    Apr 03, 2019

    Another ransomware attack has struck, but this time the massive attack on AriZona Beverages was targeted, as first reported by Tech Crunch. After more than 200 company-networked computers displayed the message “Your network was hacked and encrypted,” the company’s IT department had...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62826282

    UK ORGS, CHARITIES IMPROVING IN CYBERSECURITY

    Apr 03, 2019

    Businesses and charities are showing progress in defending against breaches and ensuring General Data Protection Regulation Compliance (GDPR), according to a new report published by the Department for Digital, Culture, Media and Sport. The Cyber Security Breaches Survey 2019 found that less than a t...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62836283

    HOW BLOCKCHAIN WILL ENABLE FASTER AND TRANSPARENT PAYMENTS

    Apr 02, 2019

    As more blockchain-based payment networks and fiat-backed digital currencies – including one from the largest U.S. bank – emerge, experts and analysts are predicting a humongous change for the financial services industry. "I think you're starting to see a growing consensus,"...

    THE ECONOMIC TIMES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62756275

    WHY MCAFEE IS INTEGRATING AI INTO NEXT GEN SECURITY

    Apr 01, 2019

    Machine Learning and Artificial Intelligence (AI) are often over-used terms in a modern cyber-security context, but that doesn't mean they aren't useful for helping organizations and vendors to improve. Among the many vendors that have embraced AI is McAfee, which is integrating different ca...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62716271

    GOOGLE REVEALS HOW IT KEEPS THE PLAY STORE SECURE

    Apr 01, 2019

    Google's latest Year in Review report, in which it tackles all things Android, discloses more details aobut how the company is keeping its mobile ecosystem safe and secure for its users. This year, it proudly showcased figures which seem to suggest that users that only download apps through the ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62726272

    CLOUDFLARE 1.1.1.1 WITH WARP ACCELERATES INTERNET PRIVACY

    Apr 01, 2019

    Cloudflare announced its new 1.1.1.1 with Warp service on April 1, providing a new security service that looks to provide consumers with improved privacy and security for internet access. The new consumer service is likely a precursor to Cloudflare's entry into the multi-billion-dollar market fo...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62736273

    MILLIONS OF CUSTOMERS' DATA ACCESSED IN SECOND TOYOTA HACK

    Apr 01, 2019

    Tokyo sales subsidiaries raided. Auto giant Toyota has apologized to customers after a large data breach at its Tokyo area sales network was discovered on March 21 Japanese time. Toyota said unauthorized network access to a server used by sales subsidiaries may have leaked up to 3.1 million pieces o...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62746274

    PUBLIC SECTOR DATA SECURITY REVIEW COMMITTEE APPOINTED IN SINGAPORE

    Mar 31, 2019

    The Committee was appointed in light of a series of four data-related incidents which occurred to the Health Ministry in the past 10 months. Singapore Prime Minister Lee Hsien Loong recently announced the appointment of a Public Sector Data Security Review Committee to conduct a comprehensive review...

    HEALTHCARE IT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62636263

    ISURANCE COMPANIES IN THE US COLLABORATE TO OFFER CYBER-SECURITY RATINGS

    Mar 31, 2019

    In a collaborative effort, some of the world’s largest insurers have set out to create a consumer ratings service for the cyber-security industry. The initiative was launched last week in the US, led by Marsh & McLennan, and will attempt to score best products to reduce hacking risks and w...

    SC MAGAZINE UK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62656265

    WORLD BACKUP DAY 2019 – EXPERTS SHARE THEIR VIEWS ON WHY 2019 IS AN IMPORTANT YEAR FOR BACKUP

    Mar 29, 2019

    World Backup Day is a chance for organisations to pause and take stock of their data handling, and ensure they are following best practice. The day has been celebrated since 2011 to help raise awareness of the sheer impact data loss can have on organisations and people. The causes of these incidents...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62606260

    ONLY HALF OF BUSINESSES CAN PROPERLY DEFEND AGAINST CYBERATTACKS

    Mar 29, 2019

    There is a ‘visible gap’ between security measures EU businesses say they take, and the ones they actually do take, according to a new survey by security experts Kaspersky Lab. More than four in five (83 per cent) of IT decision makers across six EU countries say they take precautionary ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62616261

    RUSSIA THREATENS TO BLOCK POPULAR VPN SERVICES

    Mar 29, 2019

    Comms watchdog wants to prevent website access. Russia's communications watchdog threatened on Thursday to block access to popular VPN-services which allow users to gain access to websites which have been outlawed by Moscow. Russia has introduced tougher internet laws, requiring search engines t...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62626262

    GOOGLE BOOSTS 2FA SECURITY PROCESS

    Mar 28, 2019

    Google just announced new updates for its 2-step verification tool for G Suite users. The company claims that for some mobile and desktop users this will come as an update, for others will come as a brand new feature, “available for some devices”. According to company blog posts, the upd...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62506250

    CISCO PATCHES BUGS GALORE, SAYS 2 ROUTERS STILL VULNERABLE TO ATTACKS

    Mar 28, 2019

    Cisco released a slew of software patches to fix bugs in its IOS XE operating system, but said two small business routers are still vulnerable to attacks. In all, Cisco issued 25 security alerts on Wednesday and Thursday. It rated 19 high severity and six medium. As of Thursday morning, Cisco didn&r...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62516251

    DLA PIPER SET TO SUE INSURER OVER NOTPETYA CLAIM: REPORT

    Mar 28, 2019

    DLA Piper has become the latest big name to be denied a multimillion-dollar insurance claim following major losses caused by the NotPetya ‘ransomware’ campaign of 2017. The multi-national law firm is said to be launching a legal case against its insurer Hiscox for failing to pay out. How...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62526252

    DEFENDING THE DEFENDERS OF THE CYBER UNIVERSE: HOW TO MITIGATE STRESS IN CYBERSECURITY

    Mar 28, 2019

    Stress is meant to be good for us. Some say it helps us accomplish tasks more efficiently and is important for survival. Unfortunately, the modern lifestyle, likely shaped by the advent of technology, has caused the scale to tip heavily toward chronic stress. According to the American Psychological ...

    FORBES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62536253

    7 WAYS CLOUD COMPUTING IS SHAPING HEALTHCARE IN 2019

    Mar 28, 2019

    Envision a futuristic technology where you can simply enter your health concerns and symptoms into the system along with insurance details, get advice from a physician in real-time and electronically receive prescriptions, order medicines online with automated payment either by insurance company or ...

    THE ECONOMIC TIMES
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62546254

    AUSTRALIANS HONOURED IN GOOGLE FACULTY RESEARCH AWARDS

    Mar 27, 2019

    Six researchers receive grants for world-class technical research. Australian researchers from three universities have stood out in this year’s Google Faculty Research Awards, a highly competitive international grants program that drew 910 proposals from more than 320 academic institutions. Si...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62406240

    RSAC 2019 SHOWCASES ENTREPRENEURS SECURING OUR NEW WORLD

    Mar 27, 2019

    Earlier this month, the top cybersecurity startups traveled to the new and improved Moscone Center to battle it out at the RSA Security Conference’s "Shark Tank"-style competition. These eminent data scientists, cyber warriors and scrappy entrepreneurs delivered three-minute pitches ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62426242

    AMERICAN CONSUMERS DISTRUST SOCIAL MEDIA PRIVACY CAPABILITIES

    Mar 27, 2019

    Cyber-crime has become an accepted part of life for many Americans, and most want to do more to protect their privacy, according to a new report from Symantec. The Norton LifeLock Cyber Safety Insights Report, was released on March 26, providing insight into consumer attitudes about the current stat...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62436243

    EDGE COMPANIES LAUNCH OPEN RESEARCH GROUP, PUBLISH SECOND REPORT

    Mar 27, 2019

    The state of data at the edge is … there’s a ton of data being generated, it needs to be secured and managed, and that requires orchestration and automation. This, according to the first topic-specific edge report published by Vapor IO, Packet, and Seagate Technology. The free report fo...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62446244

    FACEBOOK SAYS UP TO 111,813 AUSSIES IN LAST YEAR'S SECURITY BREACH

    Mar 27, 2019

    Out of 29 million users impacted worldwide. Facebook has revealed that a mass security breach of its systems last year “may have” affected the personal information of up 111,813 Australian users. In September last year, hackers exploited three linked bugs to steal name, contact and other...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62266226

    KUBERNETES 1.14 ADDS WINDOWS AND STORAGE SUPPORT, IS LIGHT ON SECURITY

    Mar 26, 2019

    The Kubernetes project is looking to get past unlucky 13 with the latest release of the container orchestration platform. The new 1.14 release includes new support for Windows containers and storage options but is light on new security features that overshadowed the previous release. The update itse...

    SDNCENTR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62276227

    MOST SECURITY PROS ARE IMPACTED BY GEOPOLITICS

    Mar 26, 2019

    Two-thirds of cybersecurity professionals have been forced to change where and with whom they do business because of escalating concerns around nation state attacks, according to Tripwire. The security vendor polled 218 security professionals at the RSA Conference in San Francisco recently and found...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62286228

    INFOSEC19: SKILLS SHORTAGES ARE EXPOSING FIRMS TO CYBER RISK

    Mar 26, 2019

    Over half (52%) of IT and security professionals believe that cybersecurity skills shortages are putting their business at an increased risk of attack, according to a new poll from Infosecurity Europe. Now in its 24th year, Europe's leading cybersecurity show asked over 9700 of its Twitter follo...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62296229

    OVER 10.5 BILLION MALWARE ATTACKS DETECTED IN 2018

    Mar 26, 2019

    The number of cyberattacks escalated last year to top 10.5bn incidents attacks, new research has found. According to a report by SonicWall based on intel harvested from more than a million sensors placed worldwide, says 10.52 billion malware attacks were registered in 2018, and that hackers are also...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62416241

    IGNORE THE SEC’S STRENGTHENED STANCE ON CYBERSECURITY AT YOUR OWN PERIL

    Mar 25, 2019

    With constantly changing technology, integrated core business processes, and connected devices now pervasive, the threat and impact of cyberattacks are higher than ever. Attackers—whether individuals or nation-states—are becoming more astute, putting pressure on companies to take immedia...

    BRINK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62136213

    ASUS USERS TARGETED IN LARGE SUPPLY CHAIN ATTACK

    Mar 25, 2019

    Users infected via software update utility. Kaspersky Lab researchers have uncovered a large-scale attack against ASUS users in which a software update utility was modified and used to distribute malware. The researchers said investigations into the attack - dubbed Operation ShadowHammer - are &ldqu...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62206220

    LOCKERGOGA RANSOMWARE SUSPECTED IN TWO MORE ATTACKS

    Mar 25, 2019

    A pair of U.S. chemical manufacturing companies have reportedly been struck by the LockerGoga ransomware over the past month and continue to recover from the same cyberattack that took down part of Aluminum giant Norsk Hydro last week. The attacks against Hexion and Momentive started on March 12, ac...

    BANKINFOSECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62216221

    MICROSOFT ISSUES THE UPDATE TO ANNOUNCE THE END OF WINDOWS 7 UPDATES

    Mar 25, 2019

    It’s not exactly the Windows Update to end all updates, but it’s close. Windows 7 machines that downloaded the most recent round of official updates got one that doesn’t do much beyond telling you to stop using Windows 7. The way it’s supposed to work is that computers runnin...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62226222

    RBS CUSTOMERS PUT AT RISK BY FAULTY SECURITY SOFTWARE

    Mar 25, 2019

    Royal Bank of Scotland (RBS) wanted to give its business banking customers an extra layer of security, but ended up possibly exposing them to cyberthreats, reports have claimed. The bank recently started offering what it calls the Heimdal Thor Foresight Enterprise, which is designed to spot and stop...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62236223

    UK SMALL BUSINESSES HIT HARDEST BY CYBERATTACKS

    Mar 25, 2019

    UK businesses have suffered a dizzying number of cyberattacks in 2018, but most of them fell on the backs of small businesses. Two thirds of companies with 10 – 49 employees have suffered some form of cyberattack in the past year. That amounts to roughly 130,000 businesses. On average, such an...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62246224

    MONITORING CLOUD APP ACTIVITY FOR BETTER DATA SECURITY: FIVE KEY TIPS

    Mar 22, 2019

    Digitisation has dramatically changed how work gets done. Business-critical apps and data are a keystroke away, no matter where an employee is or what time it is. Perhaps it is this familiarity with data that makes employees feel so connected to it that, when they switch jobs, they often take some o...

    CLOUD COMPUTING NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62256225

    REMOVABLE DEVICES COULD BE PUTTING BUSINESSES AT RISK

    Mar 22, 2019

    What good are best security practices and policies if your employees aren’t sticking to them? New research among UK workers are doing just that – not adhering to their own companies’ cybersecurity policies. The report was released by ESET and Kingston Digital, and is based on a pol...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62116211

    FACEBOOK STORED MILLIONS OF USER PASSWORDS IN PLAIN TEXT

    Mar 22, 2019

    Hundreds of millions of users to be notified. Scandal-ridden social network giant Facebook has owned up to accidentally storing hundreds of millions of user passwords in clear text, but says they were not exposed externally. Facebook's vice president of engineering, security and privacy Pedro Ca...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62126212

    PWN2OWN RESEARCHERS REVEAL ORACLE, VMWARE, APPLE ZERO-DAY EXPLOITS

    Mar 21, 2019

    The first day of the 2019 Pwn2Own hacking competition saw researchers awarded a total of $240,000 for demonstrating new zero-day exploits in Apple Safari, Oracle VirtualBox and VMware Workstation. Day in and day out, vendors do their best to keep their software patched and free from zero-day vulnera...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61966196

    PORTWORX BOOSTS CLOUD-NATIVE DATA SECURITY AND DISASTER RECOVERY

    Mar 20, 2019

    Portworx Enterprise 2.1 adds new capabilities to its cloud-native Kubernetes data management platform, improving resilience and security. Portworx announced the latest edition of its namesake cloud-native storage and data management platform on March 20, providing users with new security and disaste...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61976197

    HALF OF EU BUSINESSES ATTACKED IN LAST TWO YEARS

    Mar 20, 2019

    More than half of businesses in the EU have had their operations disrupted by cyberattacks in the past 24 months, highlighting the size of the problem organisations everywhere are facing. This is according to a new report by Kaspersky Lab, which says that some of the reasons why businesses are feeli...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61986198

    BEC GIFT CARD SCAMS GO MOBILE

    Mar 20, 2019

    Cyber-criminals are evolving their tactics with Business Email Compromise (BEC) attacks by transferring victims from email over to mobile communications channels early on in a scam, according to Agari. Researcher James Linton described how such an attack typically takes place, with the initial spoof...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61996199

    FHIR, CLOUD, POP HEALTH AND SOCIAL DETERMINANTS SPARK NEW SECURITY CHALLENGES

    Mar 20, 2019

    With increasing buzz around population health and social determinants of health, those two forces are poised to change philosophies around care delivery and how a hospital or health system works to keep the surrounding community healthy. While that likely means good things for patients and outcomes,...

    HEALTHCARE IT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62106210

    SOFTNAS CLOUD VULNERABILITY COULD ALLOW HACKERS TO BYPASS AUTHENTICATION

    Mar 20, 2019

    A vulnerability in SoftNAS Cloud data storage platform could allows attackers to bypass authentication and gain access to a company’s web-admin interface without valid credentials. Security vendor Digital Defense disclosed the flaw in a blog post today, and said SoftNAS worked with its Vulnera...

    SDNCENTR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=62146214

    KEY TRENDS FROM THE MOST EXPLOITED VULNERABILITIES

    Mar 20, 2019

    While the cyber-security threat landscape is generally thought to change from year to year, some things, as it turns out, remain unchanged. According to a report released March 19 from Recorded Future that analyzes the top vulnerabilities of the past year, one of the key trends is that the same vuln...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61956195

    TRENDS BEHIND ANTICIPATED $300+ BILLION CYBERSECURITY MARKET

    Mar 19, 2019

    Leading technology companies in the world have experienced and countered cyber-attacks since the advent of the internet, eventually leading to the inception of cybersecurity market. Today, cybercrimes are measured among the most active and loss inducing offences being witnessed globally, enveloping ...

    SMART ENERGY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61756175

    POST-QUANTUM CRYPTOGRAPHY BECOMING RELEVANT IN PRE-QUANTUM WORLD

    Mar 19, 2019

    Quantum computers will be able to instantly break the encryption of sensitive data protected by today's strongest security, warns Arvind Krishna, director of IBM Research. "Anyone that wants to make sure that their data is protected for longer than 10 years should move to alternate forms of...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61856185

    HALF OF ORGANISATIONS LACK ENOUGH SECURITY TALENT TO BE SECURE

    Mar 19, 2019

    Those thinking artificial intelligence (AI) will steal their jobs need not worry – the software is only filling the blanks, at the moment. And the blanks, at least when it comes to cybersecurity, are quite large. According to the latest Trend Micro figures, organisations worldwide are faced wi...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61866186

    MICROSOFT AZURE SENTINEL USES DATA ANALYTICS TO IMPROVE SECURITY

    Mar 19, 2019

    Giving a wider range of fresh cyber-attack threats and information to IT security workers 24/7 is the aim of a new Microsoft Azure security tool—Microsoft Azure Sentinel—that was just released by the company in preview mode. Built to streamline the collection of IT security information a...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61876187

    MOZILLA IMPROVES WEB BROWSER SECURITY IN FIREFOX 66 UPDATE

    Mar 19, 2019

    Mozilla released the Firefox 66 update on March 19, providing users of the open-source web browser with new features that enhance user experience and improve security. Among Firefox 66's new features is one that blocks websites from auto-playing sound, which can be an annoyance. Also, the search...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61886188

    ONLY 28% OF GOV.UK DOMAINS SUPPORT DMARC

    Mar 19, 2019

    Only around a quarter of the UK government’s gov.uk domains have been set up to support an industry best practice email validation system, despite the imminent retirement of a previous public sector domain platform, according to Egress. The security vendor found that just 28% of gov.uk domains...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61896189

    SMBS COULD BE THE KEY TO CRACKING DATA BREACHES

    Mar 18, 2019

    If we want to reduce the number of successful cyberattacks that target businesses – we need to turn our attention towards small and medium-sized ones because, if a newly released report is to be believed, they are the weakest link in the chain. The report issued this morning by Business in the...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61766176

    WHY TRUST IS KEY FOR CYBER-SECURITY RISK MANAGEMENT

    Mar 18, 2019

    Trust is an often-overused term, but according to Rohit Ghai, president of RSA Security, trust is the key to understanding and managing digital risk. In a video interview with eWEEK, Ghai discusses his views on trust, where the concept of an artificial intelligence "digital twin" fits in a...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61776177

    TOP LONDON ATTRACTIONS HIT BY MILLIONS OF CYBERATTACKS

    Mar 18, 2019

    The UK's museums and other tourist attractions are being hit by more cyberattacks than ever before, new research has found. A Freedom of Information (FoI) request issued by the Parliament Street think tank to four major tourist attractions in the UK - Kew Gardens, National History Museum, Tate G...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61786178

    SHRED-IT HELPS HOTELIERS PREVENT DATA SECURITY ISSUES

    Mar 18, 2019

    Cyber breaches are a huge security concern for the hotel industry—but they’re not the only security concern. “The industry has seen its fair share of cybersecurity breaches over the last few years and while it is absolutely essential that hotels have their cybersecurity protections...

    HOTEL BUSINESS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61796179

    CBA ASSURES ITSELF OF LANDMARK WHITE'S POST-BREACH INFOSEC

    Mar 18, 2019

    First lender to reinstate valuation firm. CBA has reinstated LandMark White as an option to conduct residential property valuations, after the institution assured itself of the valuer’s information security following a data breach in January. LandMark White said in a financial filing that it a...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61726172

    WOODSIDE BUYS INTO WA CYBER SECURITY FIRM

    Mar 18, 2019

    security firm that specialises in protecting critical infrastructure. The resources company announced today that, subject to conditions precedent, it would buy into Sapien Cyber Ltd. Sapien describes itself as providing a security solution for security both IT and OT. Woodside said that Sapien &ldqu...

    COMPUTERWORLD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61746174

    SECURITY BUDGETS GET AN SME BOOST IN 2019

    Mar 15, 2019

    Small and medium-sized enterprises will be spending more money on security this year, as well as hiring new staff, according to new research from Armor. Apparently, they’re more aware of the huge importance of having airtight cybersecurity. According to the report, four in five SMEs will be lo...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61736173

    KATHMANDU PROBES POSSIBLE CARD SKIMMING BREACH

    Mar 15, 2019

    In a statement posted to the New Zealand Exchange (NZE), the firm said it was notifying potentially affected customers directly, advising them to contact their banks and card providers. “Kathmandu has recently become aware that between January 8, 2019 NZDT and February 12, 2019 NZDT, an uniden...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61706170

    VMWARE LAUNCHES SERVICE-DEFINED FIREWALL FOR INTRINSIC SECURITY

    Mar 15, 2019

    New Zealand-based outdoor clothing retailer Kathmandu is urgently investigating a potential breach of customer card data harvested from its websites. There are a number of different ways to think about security and how it should be implemented. For Tom Gillis, senior vice president and general manag...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61716171

    THE EUROPEAN COUNCIL HAS ANNOUNCED ITS POSITION ON CYBERSECURITY CENTRES

    Mar 14, 2019

    The European Council has announced that the European Union is stepping up its protection against cybersecurity threats, and is discussing a new structure of European cybersecurity centres. The European Council’s Permanent Representatives Committee have granted a mandate to the Romanian preside...

    SCITECH EUROPA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61556155

    5 CYBERSECURITY THREATS YOUR DNS LOGS ALREADY REVEAL

    Mar 14, 2019

    Cybersecurity can be an exhausting job. Between the onslaught of ‘silver bullet’ tools that supposedly protect organizations, and the additional layer of tools needed just to make sense of the first group, even the smartest teams are finding themselves stretched thin. There are signals a...

    TECHRADAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61566156

    GEOSCIENCE AUSTRALIA TAKES ACTION AFTER CYBER SECURITY FAIL

    Mar 14, 2019

    Moves to have all Essential Eight in place by June 2020. Geoscience Australia has kicked off a program of work to implement all the government’s mandatory and non-mandatory cyber security requirements by 2020 after being labelled highly exposed to cyber-attack last year. In June 2018 the Austr...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61576157

    CRYPTOJACKING TAKES A NEW TURN IN CRYPTOSINK CAMPAIGN

    Mar 14, 2019

    Researchers from F5 Labs reported on March 14 that they have discovered a new cryptojacking campaign that is abusing unpatched Elasticsearch servers. Unauthorized cryptocurrency mining, commonly referred to as "cryptojacking," is an attack trend that started in 2017 and hit a peak in mid-2...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61586158

    FACEBOOK SUFFERS GLOBAL OUTAGE, CLAIMS DDOS NOT THE CAUSE

    Mar 14, 2019

    Facebook users around the world had a singular question for much of March 13: Is Facebook down? As it turns out, the global social media giant and its related Instagram and WhatsApp services were in fact unavailable and down for much of the day. Some service was restored by March 14, though full glo...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61596159

    PROTECTING APPLICATIONS AGAINST DFA ATTACKS

    Mar 14, 2019

    2001 was an exciting time for cryptography, as the new Advanced Encryption Standard (AES) specification was finalized, making a mathematically secure and performant encryption algorithm available to the public. Designed to replace older cryptographic algorithms that were starting to show weaknesses ...

    HELP NET SECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61476147

    6SENSE ANNOUNCES SALESFORCE PARDOT INTEGRATION FOR REVENUE TEAMS TO LAUNCH COMPREHENSIVE ABM PROGRAMS

    Mar 14, 2019

    6sense, a leading Account Based Orchestration Platform, powered by AI, extends its relationship with Salesforce to include an all-new integration with Pardot, Salesforce’s marketing automation solution. This integration combines marketing execution from Salesforce Pardot with the time-based pr...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=67206720

    BLOCK IN RUSSIA UNJUSTIFIED, SAYS PROTONMAIL

    Mar 13, 2019

    Claiming that it had received multiple bomb threats via email messages, the Russian government restricted internet access, which resulting in blocking ProtonMail email servers, according to PortSwigger. In a March 12 blog post authored by Andy Yen, ProtonMail founder, Yen called the block "unju...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61486148

    DPI19: OPEN BANKING AND DATA SHARING WILL BENEFIT CONSUMERS

    Mar 13, 2019

    Speaking at the IAPP Data Protection Intensive 2019 conference in London on 'How Privacy & Data Protection are Impacted by Competition Considerations,' Helena Koning, senior managing counsel and data protection officer at Mastercard, said that new rules on open banking are permitting mor...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61496149

    CHINA THREAT OVERBLOWN BY EU CYBERSECURITY ACT

    Mar 13, 2019

    On Tuesday, March 12, Members of the European Parliament (MEPs) adopted the European Union (EU) Cybersecurity certification scheme for products, processes and services.The Cybersecurity Act is a scheme to ensure that certified products, processes and services sold in EU countries meet cybersecurity ...

    CGTN
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61396139

    TETRATE EMERGES WITH ENTERPRISE SERVICE MESH PLATFORM

    Mar 13, 2019

    Tetrate officially launched on March 13, announcing its enterprise service mesh platform that is built on top of the open-source Istio and Envoy projects. The concept of a service mesh has been an emerging trend over the past year as an approach that enables networking connectivity and security poli...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61456145

    INSIDERS ARE BIGGEST SECURITY PROBLEM FOR COMPANIES TODAY: CYBER SECURITY EXPERT

    Mar 13, 2019

    Saryu Nayyar is the CEO of Gurucul, a company that specialises in user and entity behavior analytics, identity analytics, fraud analytics and cloud security analytics. Nayyar is an internationally recognised cyber security expert, author, speaker and member of the Forbes Technology Council. She has ...

    THE WEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61466146

    GEORGIA COUNTY PAYS $400,000 TO RANSOMWARE ATTACKERS

    Mar 12, 2019

    Officials in Jackson County, Georgia, along with the FBI are investigating a ransomware attack that crippled IT systems over a two-week period. Struggling to recover from the outage, local officials reportedly paid a ransom worth $400,000 in bitcoins to restore IT systems and infrastructure. Jackson...

    BANKINFOSECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61356135

    EXPERTS EXPRESS CONCERNS AS CYBER SECURITY THREATS LOOM ON SMART CITIES

    Mar 12, 2019

    Cyber security threats loom large on Smart cities as the country embarks on a journey to create about 100 such cities driven by smart solutions, leveraging on cutting edge technology. Together, these Smart cities aim to house 40 per cent of India’s population and contribute about 75 per cent t...

    BUSINESS STANDARD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61366136

    THE MUST-HAVES FOR YOUR DATA CENTER CYBERSECURITY CHECKLIST

    Mar 12, 2019

    The cyberthreat landscape is changing faster than ever for data center managers. Cybercriminals pulled in record hauls last year from ransomware, business email compromise, and other nefarious schemes, and they’re expected to be investing some of that money in new attack methods and platforms....

    DATA CENTER KNOWLEDGE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61376137

    THE MOBILE APPLICATION SECURITY QUANDARY

    Mar 12, 2019

    The need for enhanced mobile application security is being driven by increasingly powerful mobile devices and the ubiquitous availability of bandwidth, says John Aisien of Blue Cedar. "Enterprise computing is not only moving to the cloud at an amazing pace, but some of that compute is also movi...

    BANKINFOSECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61386138

    ADDIGY ADDS SINGLE SIGN-ON TO ITS APPLE DEVICE MANAGEMENT PLATFORM

    Mar 11, 2019

    Apple device management platform vendor Addigy has unveiled a wide range of new features for its cloud-based services, including single sign-on capabilities, LANCache peer-to-peer caching and expanded mobile device management (MDM) services. The new features, which were announced here at the Addigy ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61256125

    HOW TO REDUCE ERP SECURITY RISKS

    Mar 11, 2019

    Enterprise resource planning (ERP) systems are among the most critical enterprise applications that an organization operates and as such, they represent a lucrative target for attackers. In a session at the RSA Conference last week, Onapsis CTO JP Perez-Etchegoyen outlined what's behind ERP brea...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61266126

    ERICSSON TESTS FIRST CERTIFIED DEVICE FOR CTIA’S IOT CYBERSECURITY PROGRAM

    Mar 11, 2019

    An aftermarket connected car device is the first to be certified by CTIA’s IoT Cybersecurity Certification Program, which launched last August to help ensure the increasing number of cellular-connected devices have appropriate security capabilities. The device, the Harman Spark, is offered exc...

    ELECTRONIC COMPONENT NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61276127

    HOW SMBS CAN BOLSTER CYBERSECURITY EFFORTS

    Mar 11, 2019

    Keeping current with cyberthreats is an imposing logistics problem facing small- and medium-sized businesses (SMBs)—cybercriminals are constantly changing their tactics. If something stops working or fails to provide sufficient return for their effort, the bad guys move on. That may work well ...

    TECHREPUBLIC
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61286128

    SKILLS GAP IS LEADING TO MAJOR SECURITY WORRIES

    Mar 11, 2019

    Finding skilled cybersecurity staff is an increasingly difficult task, new research has claimed. A new report by Tripwire found it’s not just about not having actual people to do the job – it’s also due to the rapidly transforming technology and threat landscapes. Consequently, the...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61296129

    BANKING TROJANS SEE MAJOR RISE IN 2018

    Mar 08, 2019

    Kaspersky Lab has revealed a major rise in the number of banking Trojans, also known as "bankers". The company says it tracked almost 900,000 bankers in 2018, a 15 per cent increase compared to 2017, when it registered 767,000 attacks. Allegedly, there have been ‘increased activities...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61206120

    HUMAN ERROR STILL A MAJOR SECURITY WORRY

    Mar 08, 2019

    For businesses of all sizes, from SMBs to large corporations – human error is still one of the main pain points when it comes to cybersecurity. A new report from BAE Systems found 71 per cent of all recorded incidents started as a phishing attack, and roughly two thirds (65 per cent) were unta...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61226122

    WHAT’S REALLY BEHIND FACEBOOK’S NEW PRIVACY AND ENCRYPTION EFFORT?

    Mar 08, 2019

    On its face, Mark Zuckerberg’s announcement that Facebook plans to move to a more privacy-oriented service seems like welcome news, given how he and his company have run roughshod over his users’ privacy since its founding. But now he’s saying that he wants to make personal interac...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61236123

    BREACHES AND LEAKS SOARED 424% IN 2018

    Mar 08, 2019

    Nearly 15 billion identity records circulated in underground communities in 2018, a 71% increase over the year as hackers targeted smaller organizations more widely, according to a new report from 4iQ. The identity intelligence company scanned the surface, social, deep and dark web for identity rela...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61246124

    VIVA THE REVOLUTION: HOW CYBERSECURITY CAN HELP WITH DIGITAL TRANSFORMATION

    Mar 07, 2019

    We've had the Atomic Age, the Space Age and the Information Age, and now we're on the cusp of what could be called the culmination of all those – the Fourth Industrial Revolution, in which data, devices, and advanced technologies like biotech and nanotech are already bringing major cha...

    TECHRADAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61086108

    OVERCOMING THE 2019 CYBER-THREAT

    Mar 07, 2019

    Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce. Recent research by Microsoft found that only 11.4 per cent of European employees feel highly productive at work, and, amidst the arrival of innovative technologie...

    TECHRADAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61096109

    FTSE 350 BOARDS STILL STRUGGLING WITH CYBER AWARENESS

    Mar 06, 2019

    UK boards are getting better at understanding cybersecurity as a strategic issue, but still lack crucial awareness of the impact of attacks on their organization, according to a new government report. The FTSE 350 Cyber Governance Health Check 2018 features data collected from interviews with the to...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60986098

    NEW GOOGLE CHROME ZERO-DAY VULNERABILITY FOUND ACTIVELY EXPLOITED IN THE WILD

    Mar 06, 2019

    You must update your Google Chrome immediately to the latest version of the web browsing application. Security researcher Clement Lecigne of Google's Threat Analysis Group discovered and reported a high severity vulnerability in Chrome late last month that could allow remote attackers to execute...

    THE HACKER NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60996099

    MOBILE MALWARE ATTACKS DOUBLE IN 2018

    Mar 06, 2019

    Smartphones are facing more security threats than ever before, with mobile malware attacks hitting a new high in 2018, new research has found. Findings from Kaspersky Lab report that the number of mobile malware attacks doubled in 2018, topping 116.5 million last year, compared to 66.4 million in 20...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61056105

    MASSIVE SPOILER VULNERABILITY AFFECTS INTEL CPUS

    Mar 06, 2019

    Another major security vulnerability is affecting Intel processors, experts have warned. SPOILER was detected by researchers at Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany, and could be even more dangerous that the infamous Spectre vulnerability. The...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61216121

    DIRECTIVE RANKS #1 IN CLUTCH’S TOP B2B MARKETING SERVICE PROVIDERS

    Mar 06, 2019

    Directive, the leading B2B and enterprise search marketing agency, has recently been honored as the number one B2B marketing and advertising service provider in Los Angeles, according to Clutch. Clutch is a B2B research, ratings and reviews site that identifies leading IT and marketing service provi...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66336633

    RSA SECURITY OUTLINES A PATH FOR THE TRUST FUTURE

    Mar 05, 2019

    Often RSA Conference keynotes detail new technologies or outline existing challenges. At the RSA Conference 2019 here, RSA Security took a different approach this year—predicting a possible future that could be less than ideal for humanity unless the right steps are taken. Rohit Ghai, presiden...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60956095

    MICROSOFT SECURITY SERVICES PUT AI, EXPERTS TO WORK AGAINST THREATS

    Mar 05, 2019

    Microsoft is rolling out a brace of threat fighting capabilities for Windows 10 administrators that promise to bring the big guns of the company’s security experts, as well as its AI capabilities, to bear against attackers. The new services are Microsoft Azure Sentinel and Microsoft Threat Exp...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60966096

    HOW TO STAY AHEAD OF THE NEXT OPERATIONAL TECHNOLOGY THREAT

    Mar 05, 2019

    The daily deluge of negative security headlines and data breaches isn't the whole story when it comes to modern cyber-security, according to Cisco. In a keynote at the RSA Conference here, Cisco executives outlined some key successes against recent threats and detailed a strategy for bridging th...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60976097

    FINANCIAL FIRMS FACING GREATER CYBER THREAT

    Mar 05, 2019

    Banks and other financial businesses are facing a greater cybersecurity threat than ever before, new findings have said. Research from security firm Carbon Black found that over two-thirds (67 per cent) of finance firms have reported an increase in cyberattacks over the past 12 months as hackers goe...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61076107

    LAZARUS GROUP RETURNS WITH MAJOR SPEARPHISHING CAMPAIGN

    Mar 04, 2019

    North Korean hacking outfit Lazarus Group is targeting users around the world with a major new spearphishing campaign. Security firm McAfee says it has found evidence linking Lazarus to the huge Operation Sharpshooter attack first detected last December which uses sophisticated spearphishing emails ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=61066106

    WHY RANSOMWARE IS STILL AN ACTIVE THREAT

    Mar 04, 2019

    For several years, ransomware was a rising threat, causing hundreds of millions of dollars in damages and disrupting operations around the world. But what is the state of ransomware in 2019?  In a session at the RSA Conference here, a pair of McAfee researchers detailed how the threat landscape...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60856085

    MCAFEE CONFIRMS OPERATION SHARPSHOOTER LINK TO NORTH KOREA

    Mar 04, 2019

    Researchers have confirmed the Operation Sharpshooter APT campaign uncovered in December 2018 is likely the work of North Korean hackers, and has been active for a year longer than previously thought. McAfee revealed today that it was given a rare insight into the inner workings of such a group afte...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60866086

    SECURITY LEADERS SUFFERING FROM CYBER FATIGUE

    Mar 04, 2019

    Cybersecurity professionals are positive about the challenges of dealing with the growing number of threats around today, but many still feel pessimistic about their work, new research has found. A significant number of workers say they are suffering from "cyber fatigue" according to Cisco...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60886088

    IT SECURITY PROGRAMMES BEING DELAYED BY BOARD HOLD-UPS

    Mar 01, 2019

    Two-thirds of UK firms believe their security programme is now "continuously reactive". UK firms are split between a desire protect their products or their business when it comes to security priorities, according to new research. A report from Optiv found that many UK IT security decision ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60896089

    MASSCYBERCENTER SAYS STATE FACES INCREASED THREATS

    Mar 01, 2019

    The state of Massachusetts is reportedly facing increased cyber threats from adversaries who are trying to steal sensitive information, according to the Gloucester Daily Times. In an interview with Stephanie Helm, director of the MassCyberCenter, State House reporter Christian M. Wade learned that t...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60876087

    UK GOVERNMENT UPS SECURITY PROTECTION FOR IOT DEVICES

    Mar 01, 2019

    IoT-connected devices will need to ensure they measure up to basic security standards under new rules being proposed by the UK government. Guidelines revealed today will mean that manufacturers will need to make smart devices such as TVs, routers and even children's toys conform to a new 'Se...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64466446

    DOCKER RESPONDS TO DATA BREACH AND OUTLINES THE CONTAINER FUTURE

    Mar 01, 2019

    The elephant or rather the whale in the room at DockerCon this week, was the data breach of the Docker Hub, first disclosed on April 26. During a keynote address and in a private press session at DockerCon on May 1, Docker executives provided a formal response to the data breach, which impacted 190,...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64476447

    MICROSOFT ADDS OFFICE 365 SECURITY POLICY ADVISOR SERVICE

    Mar 01, 2019

    Microsoft has introduced a new Security Policy Advisor service to make it easier for enterprise IT managers to create and manage security policies for users of Office 365. The advisor service, which was announced by Jared Spataro, a Microsoft 365 corporate vice president, in a recent post on the Mic...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=64486448

    U.S. CYBER-WARRIORS DISRUPT RUSSIAN ELECTION ATTACKS

    Feb 28, 2019

    It started in mid-October 2018, when Russian operatives of the Internet Research Agency started getting emails and direct messages on social media letting them know that the United States was watching them, that it knew their names and where they worked. Then, on Nov. 6, 2018, everything went dark f...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60726072

    STUDY: BREAKING SILOS COULD REDUCE BREACH COSTS

    Feb 28, 2019

    The cybersecurity industry experienced some ups and downs last year, according to the 3,200 senior security professionals from 18 countries who participated in Cisco’s fifth annual CISO Benchmark Study. The study revealed that security professionals experienced both encouraging gains, with onl...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60736073

    HIRING, THREATS AND BUDGET CAUSE BIGGEST SECURITY HEADACHES

    Feb 28, 2019

    The three biggest challenges faced by IT professionals relate to threats, hiring and budget.. According to a survey of 1500 IT professionals by LogRhythm, the top challenges were divided as follows: Inability to detect the full range of threats – 34%. Difficulty in finding skilled cyber profes...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60746074

    GLOBAL SPAM CALLS HIT 85 BILLION IN 2018

    Feb 28, 2019

    Global spam calls have soared by 325% over 2018 to reach a staggering 85 billion worldwide, according to new findings from Hiya. The Caller ID company claimed in its first Global Robocall Radar report that spam rates in Spain (24%), the UK (22%), Italy (21%) and France (20%) are the highest in the w...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60756075

    SSL-BASED PHISHING SURGES 400% FROM 2017

    Feb 28, 2019

    Hackers are increasingly using encrypted traffic to hide their attacks from security filters, with phishing emails soaring in popularity, according to new data from Zscaler. The cloud security provider processes more than 60 billion transactions per day and claimed that hiding threats in SSL traffic...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60766076

    SYMANTEC ADVANCES INTEGRATED CYBER DEFENSE PLATFORM

    Feb 27, 2019

    No one technology or vendor can protect an organization against all cyber-security risks. That's why Symantec has been pushing forward its vision of an Integrated Cyber Defense platform (ICD) in an effort to bring together multiple technologies with an integrated approach. On Feb. 27, Symantec a...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60776077

    MOST UK IT SECURITY LEADERS FEAR CNI ATTACK

    Feb 27, 2019

    Over half of organizations believe the UK is heading for a major attack on critical infrastructure (CNI) this year, with siloed teams causing dangerous security gaps between IT and OT functions, according to Infosecurity Europe. The region’s leading information security event polled over 12,00...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60716071

    CYBER SECURITY DURING MERGERS AND ACQUISITIONS (M & A)

    Feb 26, 2019

    On face value, one may question what company mergers, acquisitions, or takeovers have to do with cyber security. But for law firms charged with overseeing the safe completion of such transactions, cyber security should be a core consideration, for two key reasons. Firstly, there is a risk that durin...

    TODAY’S CONVEYANCER
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60486048

    ORDR RAISES $16.5 MILLION FOR NETWORK-LEVEL CYBERSECURITY

    Feb 26, 2019

    In this day and age, enterprises can’t take a traditional IT approach to security — or so claims Ordr, a Santa Clara, California-based startup developing a network-level cybersecurity platform. It contends that the client-side security suites installed on legacy workstations, laptops, an...

    VENTUREBEAT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60576057

    GV LEADS $15 MILLION INVESTMENT IN STEALTH CANADIAN CYBERSECURITY STARTUP CMD

    Feb 26, 2019

    A Canadian cybersecurity startup is emerging from stealth today with a fresh $15 million in funding from Alphabet investment arm GV, with participation from startup studio Expa, Amplify Partners, and a host of additional “strategic investors.” Founded in early 2016, Cmd is the brainchild...

    VENTUREBEAT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60586058

    PRIVILEGED CREDENTIAL ABUSE INVOLVED IN 74% OF DATA BREACHES, SAYS STUDY

    Feb 26, 2019

    Cybercriminals are continuing to target low-hanging fruit; according to a new study from Centrify, the security and identify firm, while 74% of data breaches involved privileged credential abuse, identity and access management resources are severely lacking among enterprises. The survey of 1,000 IT ...

    INFORMATION AGE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60596059

    HOW GAMIFICATION CAN BOOST CYBER SECURITY

    Feb 26, 2019

    Insider threats are costing companies hugely. In fact, according to the Ponemon Institute, the average cost of data breaches caused by employees is more than $8 million (£6.1 million) per year. Many breaches are caused accidentally when employees click on phishing emails or unknowingly open su...

    INFORMATION AGE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60606060

    UCONN HEALTH AMONG THE LATEST PHISHING VICTIM

    Feb 25, 2019

    Phishing and other hacking incidents have led to several recently reported large health data breaches, including one that UConn Health reports affected 326,000 individuals. In describing a phishing attack, UConn Health says that on Dec. 24, 2018, it determined that an unauthorized third party illega...

    BANKINFOSECURITY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60616061

    NEW DNS ATTACKS MAKE USE OF DNSSEC MORE CRITICAL THAN EVER

    Feb 25, 2019

    An insidious new series of cyber-attacks that redirect traffic intended for specific websites by changing their DNS records has resulted in the first emergency directive by the Cybersecurity and Infrastructure Security Agency. This directive was followed in February by an alert by ICANN (Internet Co...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60626062

    MAJOR SECURITY FLAWS DISCOVERED IN 4G AND 5G

    Feb 25, 2019

    Researchers have uncovered a number of major security holes in the communications protocols governing 4G and 5G networks. The flaws could allow an attacker, even not one necessarily highly skilled or educated, to intercept phone calls and track the victim's location. The flaw was uncovered by Ni...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60636063

    ICANN: WE NEED DNSSEC EVERYWHERE TO COMBAT HACKERS

    Feb 25, 2019

    ICANN has called on Domain Name System (DNS) stakeholders to urgently improve security across all domains to combat a growing threat from attackers. It wants DNS Security Extensions (DNSSEC) to be rolled out worldwide across all unsecured domain names in response to a wave of new DNS hijacking attac...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60496049

    HACKERS ABUSE LINKEDIN DMS TO PLANT MALWARE

    Feb 25, 2019

    Hackers are impersonating recruitment agencies on LinkedIn in a bid to target companies with backdoor malware. Researchers at Proofpoint found that the malware campaigns primarily targeted US companies in various industries including retail, entertainment, pharmacy, and others that commonly employ o...

    IT PRO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60476047

    A V-CISO’S TAKE ON THE 5 ISSUES FACING CYBERSECURITY

    Feb 25, 2019

    In just 20 years, we’ve seen the cybersecurity field grow from virtually non-existent into a $120 billion industry. But no matter how much it grows, it still feels like the bad guys are always two steps ahead. Why? Because our adversaries are, in fact, at an advantage. This advantage has less ...

    SECURITY BOULEVARD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60336033

    SOME GPS RISK VIOLATING GDPR BY SIGNING UP TO CHANGES IN CHILDHOOD HEALTH DATA SHARING

    Feb 25, 2019

    As many as 3,300 GP practices in England risk violating data protection laws if they sign up to changes in a data sharing agreement for childhood vaccination. Changes to the Child Health Information Service (CHIS), used by general practitioners in the West Midlands, parts of London and the South Wes...

    IT PRO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60436043

    LABOUR REPORTS DATA BREACH TO THE ICO AFTER MPS JOIN THE INDEPENDENT GROUP

    Feb 25, 2019

    The Labour Party has reported an alleged data breach to the Information Commissioner's Office (ICO) over fears the personal data of party members was improperly accessed following the resignation of several MPs this week. It is understood the party has accused at least one of the eight former La...

    IT PRO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60446044

    81 PER CENT OF CANADIANS CONCERNED ABOUT CYBER SECURITY

    Feb 24, 2019

    Eighty-one per cent of Canadians say they are concerned about the security of personal information held by a government department if it experiences a cyber attack. Almost eight out of 10 Canadians are also concerned about cyber attacks against organizations that may have access to their personal in...

    VICTORIA NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60306030

    FLAWS DISCOVERED IN POPULAR PASSWORD MANAGERS, REPORT CLAIMS

    Feb 22, 2019

    An analysis of multiple top password manager products has revealed vulnerabilities in the tools they use that could potentially put the security of user's credentials at risk, according to Independent Security Evaluators (ISE). A new study, Under the Hood of Secrets Management, found that a vari...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60316031

    ENTRUST TO ACQUIRE NCIPHER SECURITY TO APPROVE GEMALTO DEAL

    Feb 22, 2019

    Entrust Datacard has announced a definitive agreement to acquire nCipher Security. Less than a month after nCipher de-merged from Thales, the deal will see nCipher’s identity-based and PKI security solutions become part of Entrust, enabling Thales to complete its acquisition of Gemalto. Operat...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60326032

    19-YEAR-OLD VULNERABILITY IN WINRAR FINALLY FIXED

    Feb 22, 2019

    Security researchers have discovered a bug in the WinRAR file compression application that can allow hackers to execute code remotely. The flaw has existed in all versions of the software for the last 19 years. According to a blog post by researchers at Check Point Software, the exploit works by jus...

    IT PRO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60456045

    MALWARE MINING MONERO DISCOVERED USING HACKING TOOLS TO INFECT WINDOWS SYSTEMS

    Feb 22, 2019

    Security researchers have discovered Monero mining malware that uses hacking tools such as Radmin and Mimikatz to propagate through Windows systems. According to a blog post by security researchers at Trend Micro, the malware scans for open port 445 and exploit a Windows SMB Server Vulnerability MS1...

    IT PRO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60466046

    CYBER SECURITY MARKET COMPETITIVE SCENARIO, DRIVERS AND CHALLENGES ANALYSIS FORECAST 2028

    Feb 22, 2019

    Cyber security is designed to ensure integrity and to protect networks, computer programs, and data from unauthorized access or breaches. Various sectors use cloud services to collect and store confidential data and information, which is transferred across networks. Cyber security software plays a c...

    MARKETWATCH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60156015

    K2 CYBER SECURITY UNVEILS CLOUD WORKLOAD PROTECTION PLATFORM TO PREVENT ZERO-DAY ATTACKS IN REAL TIME

    Feb 21, 2019

    K2 Cyber Security, Inc. today announced the general availability of its cloud workload security platform, featuring two fundamental innovations that together deliver comprehensive protection for hybrid cloud environments. K2’s Optimized Control Flow Integrity (CFI)™ technology ensures an...

    DARK READING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60166016

    THE CYBERSECURITY 202: ELECTION SECURITY IS GOING TO BE THE HOT NEW DEMOCRATIC CAMPAIGN ISSUE IN 2020

    Feb 21, 2019

    Russian hacking upended Hillary Clinton's 2016 campaign. And it's already impacting the way 2020 Democrats are campaigning this time around. Election security is already emerging as a key talking point on the campaign trail as Democrats offer up policies to secure votes from potential tamper...

    THE WASHINGTON POST
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60176017

    NHS CYBERSECURITY NEEDS TO BE A QUALIFIED SUCCESS

    Feb 21, 2019

    A freedom of information request which revealed a lack of cyber and information governance training may be something of a red herring. But that doesn’t mean there isn’t valuable work to be done on creating a cyber-qualified NHS IT workforce, our expert columnist Davey Winder argues.When ...

    DIGITAL HEALTH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60186018

    CYBERX WINS CYBERSECURITY EXCELLENCE AWARDS IN THREE CATEGORIES

    Feb 21, 2019

    CyberX, the IIoT and industrial control system (ICS) security company, today announced it is a winner in three distinct product categories of the 2019 Cybersecurity Excellence Awards: IoT Security, ICS/SCADA Security, and Critical Infrastructure Security. These coveted awards recognize CyberX’...

    GLOBENEWSWIRE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60196019

    SYDNEY AIRPORT TO ESTABLISH CYBER SECURITY CENTRE

    Feb 21, 2019

    Lifts defences to reduce threats. Sydney Airport is preparing to establish an around-the-clock cyber security operations centre to protect its systems and data holdings from the threat of cyber-attack. The new centre, which is expected to be up and running by April, is aimed at enhancing “cybe...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60206020

    ERICSSON, NOKIA STRIKE BACK AT 5G READINESS CONCERNS

    Feb 21, 2019

    Ericsson and Nokia are intent on countering the notion that they are not as prepared as China-based rival Huawei to supply operators with 5G network equipment. The push comes just days ahead of the MWC 2019 event in Barcelona, Spain, where 5G will be the hot topic. Executive from both Nordic vendors...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60216021

    TOYOTA AUSTRALIA CONFIRMS 'ATTEMPTED CYBER ATTACK'

    Feb 21, 2019

    Toyota Australia has said it was hit with what it is calling an "attempted cyber attack". "At this stage, we believe no private employee or customer data has been accessed," the company said in a short statement on its site. "The threat is being managed by our IT department,...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60076007

    SYMANTEC'S EMAIL FRAUD PROTECTION OFFERING COMBATS BEC

    Feb 20, 2019

    Today’s topics include Symantec improving email security with fraud protection, and Azure maps getting new SDKs, services and expanded features. On Feb. 14, Symantec announced its Email Fraud Protection offering to help organizations combat Business Email Compromise, which involves attackers s...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60056005

    K2 CYBER SECURITY TAKES DETERMINISTIC APPROACH TO THREAT DETECTION

    Feb 20, 2019

    There are a lot of cyber-security startups that make use of artificial intelligence to help organizations detect new threats, but K2 Cyber Security isn't one of them. K2 officially emerged from stealth on Feb. 20 along with its cloud workload security platform that takes a deterministic real-tim...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60066006

    NORTH KOREAN LAZARUS GROUP STARTS TARGETING RUSSIAN ORGANIZATIONS

    Feb 20, 2019

    In an unusual move, the Lazarus hacking group associated with the North Korean government has recently started targeting organizations from Russia. The group’s primary targets until now have been organizations from countries with which North Korea has geopolitical tensions, such as South Korea...

    SECURITY BOULEVARD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60296029

    SURVEY FINDS SECURITY TEAMS BETTING ON MACHINE LEARNING

    Feb 20, 2019

    A global survey conducted by Enterprise Strategy Group (ESG) of 456 cybersecurity and IT professionals on behalf of Oracle and KPMG has found organizations are being overwhelmed by data and are hoping to get some help via machine learning. According to the survey results, fewer than one-third of res...

    SECURITY BOULEVARD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60346034

    GOOGLE ERRED IN NOT DISCLOSING MICROPHONE IN NEST SECURITY SYSTEM

    Feb 20, 2019

    Google admitted that it didn’t tell users about a built-in microphone in its Nest Secure home security system, according to a report from Reuters. On Wednesday (Feb. 20), the company said it made an error, but that it wasn’t keeping the microphone a secret. “The on-device microphon...

    PYMNTS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60356035

    FORTINET BOOSTS SECURITY MESSAGE FOR CARRIER PUSH TO 5G

    Feb 19, 2019

    Fortinet touted a new proprietary virtual security processing technology a week before the MWC Barcelona trade show in a race to boost security for carriers moving from 4G LTE to 5G. The virtual technology is designed to aid faster connection speeds and secure mobile control at the core and edge clo...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60086008

    LANDMARK WHITE DATA BREACH COULD IMPACT WESTPAC PROPERTY SERVICE CUSTOMERS

    Feb 19, 2019

    Westpac Group has warned customers that those who have conducted a property valuation through its business may have been inadvertently impacted by a separate data breach affecting LandMark White. On Tuesday, the Australian bank and financial services company said the recent security incident at Land...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=60096009

    ISRAEL LAUNCHES CYBERSECURITY HOTLINE FOR SUSPECTED HACKING

    Feb 19, 2019

    Israel has launched a cyber hotline, staffed mostly by veterans of military computing units, to enable businesses and private individuals to report suspected hacking and receive real-time solutions. The 119 call-in number to the Computer Emergency Response Center is being billed by Israel and cybers...

    HAARETZ
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59945994

    FIVE THINGS ENTERPRISES NEED TO KNOW ABOUT THREAT LANDSCAPE

    Feb 19, 2019

    It would be easy to say that 2019 is going to be the year of the state-sponsored hacker, but it would also be easy to say that this year is going to be the year of the cryptojacker. Or I could say that this is the year when cross-site scripting is going to be a major threat. But the reality is that ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59955995

    HOW MACHINE LEARNING-BASED SECURITY SEES RISK FASTER THAN LEGACY TOOLS

    Feb 19, 2019

    Machine learning (ML) and artificial intelligence (AI) are in the process of changing almost every aspect of our lives. My last post focused on how AI can be used to help businesses manage their IT environments better. This post will look at the impact ML has on security. The biggest challenge with ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59965996

    PULSE SECURE ADDS SOFTWARE DEFINED PERIMETER TO SECURE ACCESS PLATFORM

    Feb 19, 2019

    Pulse Secure announced the launch of a new Software Defined Perimeter (SDP) offering on Feb. 19, that integrates with the company's existing Secure Access platform. SDP is an industry standard framework approach led by the Cloud Security Alliance (CSA) that provides access and authentication com...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59975997

    SWEDEN’S PATIENT HOTLINE IN MAJOR PRIVACY SNAFU

    Feb 19, 2019

    Millions of highly sensitive audio files linked to a Swedish healthcare hotline have been left exposed online for several years, in what could be a major breach of the GDPR. The 2.7 million files in question amount to 170,000 hours of calls, dating back to 2013 and left on an open Apache web server ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59985998

    RUSSIAN STATE HACKERS TAKE MINUTES TO MOVE LATERALLY

    Feb 19, 2019

    There was a major rise in Chinese state-sponsored cyber-activity in 2018 while Russian actors were by far the most operationally effective, according to the latest report from CrowdStrike. The security vendor’s 2019 Global Threat Report tracked the relatively new metric of “breakout time...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59995999

    WHY CHINA IS PROBABLY BEHIND THE CANBERRA CYBER-ATTACK

    Feb 19, 2019

    Since Prime Minister Scott Morrison announced a "sophisticated state actor" had tried to hack into Australia's major political parties' networks, the government has shut down any efforts to pin the blame on China. Mr Morrison dodged multiple questions from 3AW broadcaster Neil Mitc...

    9NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59895989

    CHINESE SURVEILLANCE DATABASE EXPOSES MILLIONS OF IDS

    Feb 18, 2019

    Security researchers have spotted a mass data leak from an unsecured database which exposed the personal details of over 2.5 million surveilled Chinese residents. SenseNets Technology uses AI-powered technology in facial recognition cameras to record the movements of millions of minority Uighurs in ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59905990

    TOP 6 COUNTRIES WITH THE BEST CYBER SECURITY MEASURES

    Feb 18, 2019

    Cyber risks represent a genuine risk to governments, economies, organizations and people. In 2015, the US Government’s Office of Personnel Management was breached and traded off, with the organization declaring that 21.5 million social security numbers were stolen from one source, and 4.2 mill...

    ANALYTICS INSIGHT
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59815981

    SYMANTEC IMPROVES EMAIL SECURITY WITH FRAUD PROTECTION

    Feb 15, 2019

    Symantec is looking to reduce the risk of business email compromise attacks with a new offering that makes it easier to implement and manage Domain-based Message Authentication, Reporting and Conformance (DMARC) for email authenticity. Among the most common risks that enterprises face are email frau...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59825982

    HUAWEI RISK CAN BE MANAGED, SAY UK CYBER-SECURITY CHIEFS

    Feb 15, 2019

    Any risk posed by involving the Chinese technology giant Huawei in UK telecoms projects can be managed, cyber-security chiefs have determined. The UK's National Cyber Security Centre's decision undermines US efforts to persuade its allies to ban the firm from 5G communications networks. The ...

    BBC
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59835983

    CYBER ATTACK ON MALTA'S BANK OF VALLETTA

    Feb 15, 2019

    Malta's largest bank was the target of a cyber attack Feb 13, with hackers attempting to withdraw €13mil (RM59.7mil), Prime Minister Joseph Muscat said. The Bank of Valletta, in which the government is the largest shareholder, shut down its systems, closing branches and ATMs, and suspending...

    THE STAR
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59885988

    BIG THEMES SET TO EMERGE AT RSA CONFERENCE 2019

    Feb 14, 2019

    With hundreds of specialized sessions, there is always a lot to take in at the annual RSA Conference held in San Francisco. The 2019 event is set to get under way March 4-8 and will tackle all manner of cyber-security topics ranging from new threats, to privacy regulations, emerging technologies and...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59745974

    HACKERS TARGET MALTESE BANK IN €13M CYBER HEIST

    Feb 14, 2019

    A leading Maltese bank is resuming its services today after shutting down operations following a major cyber-attack on Wednesday. The Bank of Valetta (BOV) said in a notice on Thursday morning that customers could once again use ATMs, online banking, mobile Banking and their BOV cards, although at t...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59755975

    LOVE BUG FOUND IN OKCUPID ANDROID APP

    Feb 14, 2019

    Only days after Infosecurity reported that OkCupid users said their accounts had been hacked, Checkmarx disclosed that the OkCupid Android App actually posed risks because of security failures in MagicLinks. It’s well known that malicious actors love to exploit a good holiday, which puts users...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59765976

    PATCH TUESDAY ROUNDUP INCLUDES IE ZERO DAY

    Feb 13, 2019

    Microsoft has given system admins plenty of work to do this month with patches for nearly 80 vulnerabilities, including a zero-day flaw in Internet Explorer and a publicly disclosed Exchange server bug. Top of the priority list in this month’s Patch Tuesday security round-up will probably be C...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59675967

    PALO ALTO NETWORKS ACCELERATES SECURITY IN PAN-OS 9.0 UPDATE

    Feb 13, 2019

    Palo Alto Networks is boosting its network security platforms with the new PAN-OS 9.0 update that was announced on Feb. 12. PAN-OS is a hardened operating system based on Linux that provides a secure, enterprise grade environment for executing Palo Alto's network security capabilities. PAN-OS 9....

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59685968

    MILLIONS AFFECTED BY 500PX DATA BREACH

    Feb 13, 2019

    Online photography network 500px has forced a password reset for all users after revealing this week that it suffered a data breach last summer. The site claimed that the incident, which it believes occurred on around July 5 2018, was not discovered until last week, when its engineering team “...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59695969

    ATTIVO NETWORKS ENHANCES DECEPTION PLATFORM WITH FORENSIC COLLECTION

    Feb 13, 2019

    Attivo Networks announced on Feb. 12 that it is expanding its ThreatDefend cyber-security deception platform with its new "The Informer" forensic collection technology. Deception is a class of cyber-security technology that aims to trick attackers with fake services as an approach to help ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59705970

    CDSA RELEASES FIRST TV, FILM CYBERSECURITY GUIDELINES

    Feb 12, 2019

    The Content Delivery and Security Association (CDSA), which advocates for protection of media content, has issued its first TV and film security, notably cybersecurity, guidelines for everything from how to deal with data breaches to keeping costumes and props within the production "perimeter.&...

    BROADCASTING & CABLE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59595959

    QUALYS EXTENDS CLOUD PLATFORM WITH PATCH MANAGEMENT

    Feb 12, 2019

    Qualys announced a new patch management application on Feb. 12, providing organizations with the ability to more easily manage the often-complex process of keeping infrastructure software updated. Qualys Patch Management (PM) is part of the Qualys Cloud Platform service that runs with a single agent...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59605960

    FIRMS URGED TO PATCH SERIOUS CONTAINER RUNTIME FLAW

    Feb 12, 2019

    Enterprises have been urged to patch a serious flaw in runc, the default runtime for Docker and Kubernetes, and ensure they have SELinux enabled. Aleksa Sarai — one of the maintainers for runc — made the initial announcement on Tuesday, attributing the discovery to researchers Adam Iwani...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59615961

    PHISHING, HUMANS ROOT OF MOST HEALTHCARE ATTACKS

    Feb 12, 2019

    Across healthcare organizations in the US, malicious actors are successfully leveraging phishing attacks to initially gain access to networks, according to findings from the 2019 HIMSS Cybersecurity Survey published by the Healthcare Information and Management Systems Society (HIMSS). The study, whi...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59625962

    MUMSNET PRIVACY SNAFU EXPOSES USER INFO

    Feb 11, 2019

    Mumsnet has suffered a serious data leak affecting potentially thousands of users after a software glitch during an IT system migration to the cloud. Justine Roberts, founder and CEO of the popular parenting forum, explained in a blog post late last week that the issue affected users for the best pa...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59515951

    AWS ISSUES ALERT FOR MULTIPLE CONTAINER SYSTEMS

    Feb 11, 2019

    A security issue that affects several open source container management systems, including Amazon Linux and Amazon Elastic Container Service, has been disclosed by AWS. The vulnerabilities (CVE-2019-5736) were reportedly discovered by security researchers Adam Iwaniuk, Borys Poplawski and Aleksa Sara...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59525952

    RESEARCHERS WARN OF MALICIOUS CONTAINER ESCAPE VULNERABILITY

    Feb 11, 2019

    A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk. A new serious vulnerability in cont...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59565956

    CHECK POINT REFINING ITS SECURITY OFFERINGS TO MEET EVOLVING DEMANDS

    Feb 08, 2019

    When Check Point Software began its work in the IT security industry in 1993, smartphones, mobile tablets, IoT, and cloud applications and services didn't yet exist. Back then, Check Point's No. 1 job was providing state-of-the-art security to protect hardware, data centers and desktop machi...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59435943

    SECURITY UNICORN ILLUMIO RAISES $65M, HIRES A NEW CFO

    Feb 08, 2019

    Security unicorn Illumio raised $65 million in a Series E round and hired Anup Singh as its chief financial officer. The latest funding brings its total to $332.5 million and follows an even bigger $125 million Series D investment in June 2017. And — perhaps more importantly — it confirm...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59445944

    BLUE HEXAGON USES THE POWER OF DEEP LEARNING TO DETECT NETWORK THREATS

    Feb 08, 2019

    Blue Hexagon emerges from stealth with a cyber-security platform that makes use of deep learning techniques to infer when potential malware is active on a network. As attackers become increasingly sophisticated, there is a need for advanced technologies that can detect attacks that traditional tools...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59455945

    NETOGRAPHY EMERGES WITH AUTONOMOUS FLOW-BASED DDOS DEFENSE SERVICE

    Feb 07, 2019

    Cyber-security startup Netography emerged from stealth on Feb. 7 with a new technology approach to help organizations defend against the risk of distributed denial-of-service (DDoS) attacks. DDoS attacks typically involve large volumes of attack bandwidth that overwhelm services, rendering them unav...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59365936

    SOUTH AFRICAN UTILITY SUFFERS DOUBLE SECURITY BLOW

    Feb 07, 2019

    South Africa’s largest electricity supplier has come under fire for apparently ignoring a serious leak of customer data. Eskom, which claims to transmit and distribute 95% of the electricity used in the country, was called out earlier this week on Twitter by a frustrated security researcher. &...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59375937

    CHINA’S MSS TARGETED MAJOR EUROPEAN MSP: REPORT

    Feb 07, 2019

    Security researchers have discovered another Chinese state-sponsored APT campaign, this time targeting a major European MSP with the likely intent of stealing IP from its customers. Recorded Future and Rapid7 claimed in a new co-authored report that the notorious APT10 group, linked to China’s...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59385938

    DISCONNECT BETWEEN CONSUMERS & BUSINESSES AS COMPANIES CAPITALIZE ON CUSTOMER DATA

    Feb 06, 2019

    There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, a new report from RSA Security has discovered. The firm polled more than 6000 individuals across France, Germany, the United Kingdom and United States to explore the nuance...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59305930

    BANK IT MANAGER GETS 10 YEARS FOR ATM EXPLOIT

    Feb 06, 2019

    An IT developer at a Chinese bank has been jailed for over a decade after exploiting a vulnerability in its systems to withdraw more than $1m from ATMs. Qin Qisheng, 43, was a manager in Huaxia Bank’s technology development center in Beijing who spotted that a glitch in the lender’s core...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59315931

    MPS HIT BY PHISHING CAMPAIGN: REPORT

    Feb 06, 2019

    MPs have been targeted by a new phishing campaign after a government whip’s accounts were hacked, according to reports. Tory MP Mike Freer told BuzzFeed News that the "parliamentary authorities are currently investigating" following the incident. According to the report, dozens of MP...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59325932

    PASSWORD REUSE REMAINS A BARRIER TO SAFER INTERNET USE

    Feb 05, 2019

    The internet by default is not always safe, which is why Safer Internet Day on Feb. 5 exists—it’s a day to educate and remind users about the steps that should be taken to reduce cyber-security risks. But what are the unsafe things that users are doing online? Google conducted a study al...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59255925

    MOZILLA IMPROVES PRIVACY, SECURITY IN FIREFOX 65

    Feb 05, 2019

    Today’s topics include Mozilla improving privacy controls in Firefox 65, and IBM warning of an Apple Siri Shortcut risk. Mozilla released its first web browser update for 2019 on Jan. 29, with the debut of Firefox 65, which improves a number of features and advances user privacy as part of Moz...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59265926

    HOME IMPROVEMENT SITE HOUZZ SUFFERS DATA BREACH

    Feb 04, 2019

    Home improvement site Houzz has announced a data breach affecting an unspecified number of customers, but claimed that follow-on identity theft is “highly unlikely.” The firm — which claims to have over 40 million homeowners, home design enthusiasts and home improvement professiona...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59195919

    ALEXA 500 SITES TARGETED WITH ADAPTIVE MALWARE

    Feb 04, 2019

    A malicious campaign has been targeting premium publishers using malvertising that looks like legitimate ads for popular retailers, according to The Media Trust. Researchers today published a blog post explaining that a large-scale malicious campaign attempted to exploit 44 adtech vendors with the u...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59205920

    ORANGE’S CYBERDEFENSE UNIT GETS A LEG UP WITH SECUREDATA PURCHASE

    Feb 01, 2019

    Orange today acquired the U.K.-based security company SecureData for an undisclosed amount. This purchase is part of the global provider’s bigger push to boost its Cyberdefense unit. The independently operated SecureData has offered managed security services for over 25 years. The company says...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59135913

    HOW TO GET THE MOST OUT OF ENTERPRISE KNOWLEDGE ASSETS USING SEARCH

    Feb 01, 2019

    The demise of the Google Search Appliance (announced in early 2016) marked the end of the flawed dream of off-the-shelf, one-size-mostly-fits-all enterprise search solutions. In its place is the promise of rich search-based applications that can search, explore and analyze enterprise information. Kn...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59145914

    DELL FOUR-WAY ENDPOINT SECURITY PLAY TARGETS THE MID-MARKET

    Jan 31, 2019

    Dell launched its SafeGuard and Response as a four-level approach to endpoint security aimed at the mid-market. It’s also the second significant endpoint security announcement made this week. SafeGuard and Response includes elements from Secureworks and CrowdStrike, who are partnering on the o...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59155915

    NEW UK FRAUD RULES SET TO EMPOWER VICTIMS

    Jan 31, 2019

    New rules come into force in the UK today designed to provide consumers with stronger powers of redress in the event they fall victim to authorized push payment (APP) fraud. Regulator the Financial Conduct Authority (FCA) has mandated that fraud victims can now complain to the bank that receives fun...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59065906

    WHY U.S. FIRMS ARE LESS CYBER-SECURE THAN THEY THINK

    Jan 31, 2019

    The U.S. certainly is a divided nation around many issues right now, but concern about cybersecurity as a threat to a majority of U.S. enterprises isn’t one of them. Everybody agrees on that one. A majority of participants in a recent survey enabled by FICO understand and recognize the risk of...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59075907

    US LAUNCHES MAJOR EFFORT TO DISRUPT NORTH KOREAN BOTNET

    Jan 31, 2019

    The US authorities have begun notifying victims of a notorious botnet run by North Korean state-sponsored hackers, as their efforts to disrupt the hermit nation's malicious activity increase. A court order allowed the FBI and officers from the US Air Force Office of Special Investigations (AFOSI...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59085908

    LARGEST DDOS ATTACK SENT OVER 500 MILLION PACKETS PER SECOND

    Jan 30, 2019

    A distributed denial-of-service (DDoS) attack discovered by Imperva had unleashed more than 500 million packets per second (Mpps), which is believed to be the largest packets-per-second (PPS) attack on record. According to research released today, last year’s DDoS attack on GitHub rang in at 1...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58995899

    FACETIME SECURITY FLAW GIVES APPLE A BLACK EYE: ANALYSTS

    Jan 30, 2019

    Apple's FaceTime video chat app remained out of service Wednesday morning after being temporarily disabled by the company Jan. 28 due to a security flaw that can enable a caller to hear audio from the receiver's end before the call is accepted. That's not supposed to happen, and not only...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59005900

    THIRD-PARTY BREACHES PLAGUE MULTIPLE INDUSTRIES

    Jan 30, 2019

    From January 25 to 28, 2019, multiple organizations, including Discover Financial Services, Verity Medical Foundation, Verity Health Systems and Allen Chern LLP, have made routine filings in accordance with California state law, reporting cybersecurity incidents that may or may not be data breaches,...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=59015901

    SALT SECURITY LAUNCHES API PROTECTION PLATFORM

    Jan 29, 2019

    Startup Salt Security announced its API Protection Platform on Jan. 29, providing organizations with advanced capabilities to help discover, prevent and then remediate API attacks. Application programming interfaces (APIs) are commonly used in modern infrastructure, enabling a way to extend and inte...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58925892

    US TURNS UP HEAT ON HUAWEI WITH 23-COUNT INDICTMENTS

    Jan 29, 2019

    The US Department of Justice has unsealed charges against Huawei and its CFO covering separate alleged conspiracies to break sanctions on Iran and to steal trade secrets from T-Mobile USA. The charges were widely expected, but will do nothing to warm relations between the world’s superpowers a...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58935893

    INFO-STEALING FORMBOOK RETURNS IN NEW CAMPAIGN

    Jan 29, 2019

    A file-hosting service registered within the last week is being used to spread information-stealing malware in another FormBook campaign, currently attacking retail and hospitality businesses both within and outside of the US, according to Deep Instinct. Though FormBook has been around since approxi...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58945894

    TAXPAYERS DEMAND HMRC DELETES VOICE IDS

    Jan 28, 2019

    Over 160,000 UK taxpayers have demanded that the HMRC delete biometric voice recordings collected without their informed consent. Big Brother Watch has been running a campaign into the tax office’s use of a voice identification system, first launched in 2017. Having captured biometric data on ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58855885

    WHITE HAT BALL 2019 RAISES £193,000 FOR NSPCC’S CHILDLINE SERVICE

    Jan 28, 2019

    A staggering 193,000 was raised for counselling service Childline at the White Hat Ball last Friday, January 25. The annual fundraising event, organized by a committee of dedicated volunteers from the information security sector and now in its 14th year, was held at London’s Lancaster Hotel. T...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58865886

    ICO WARNS UK TO PREPARE FOR BREXIT "NO DEAL" DATA FLOWS

    Jan 28, 2019

    The UK’s privacy regulator has warned businesses to prepare now for a potential Brexit 'no deal,' claiming they may have to put in place standard contractual clauses to ensure unhindered data flows. With Theresa May’s government still refusing to rule out the prospect of allowing...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58875887

    CONSUMERS TERRIFIED AFTER HACKERS WORM INTO NESTS

    Jan 25, 2019

    Multiple consumers have reported being terrified after hackers infiltrated the Nest cameras in their homes, with one malicious actor making claims of a North Korean missile threat, according to CBS News. California resident Laura Lyons reported that malicious actors gained control of her Nest securi...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58785878

    HPE TARGETS GIRL SCOUTS FOR NEXT-GEN WHITE HATS

    Jan 24, 2019

    A new cybersecurity curriculum targeting junior Girl Scouts aged 9-11 aims to shift the image of the young girls in green from cookie distributors to cyber defenders, according to news from Hewlett Packard Enterprise (HPE). HPE has teamed up with the Girl Scouts to launch a cybersecurity education p...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58795879

    UK PUBLIC: DRONES ARE NATIONAL SECURITY RISK

    Jan 24, 2019

    The British public is dead-set against the use of drones, with the vast majority believing that as they continue to represent a national security risk and that cyber experts must do more to mitigate the threat from above. Think tank Parliament Street polled 2000 members of the public to compile its ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58805880

    WHAT WE LEARNED FROM MALWARE ATTACKS IN 2018

    Jan 23, 2019

    Malware blossomed in several different directions in the past 12 months, and the year ahead looks like it will be a full-fledged follow-on. According to security firm Malwarebytes, 2018 came in like a lion and out like—well, a different lion. It’s fair to say that, despite a sleepy secon...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58715871

    DHS EMERGENCY DIRECTIVE LOOKS TO BLOCK IRANIAN DNS THREAT

    Jan 23, 2019

    The US Department of Homeland Security (DHS) has taken the unusual step of issuing an emergency directive demanding government agency take urgent action to protect DNS infrastructure, in response to a major attack campaign. The Mitigating DNS Infrastructure Tampering directive was issued by the Cybe...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58725872

    SECURITY BOFFINS BLOCK 100K MALICIOUS SITES IN 10 MONTHS

    Jan 23, 2019

    Hundreds of security researchers have come together in a global non-profit project, working to take down 100,000 malicious websites in just 10 months. Revealed on Monday, the stats are testament to the power of information sharing among the information security community and hosting providers, when ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58735873

    ACTIVE CYBER DEFENCE SHOULD BE ROLLED OUT UK-WIDE: REPORT

    Jan 22, 2019

    The UK government’s highly successful Active Cyber Defence (ACD) program should be rolled out across other sectors to improve national cybersecurity, and could even be spurred by the government naming and shaming laggards, according to a new report. The Cyber Security Research Group at King&rs...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58625862

    VARONIS ADDS INCIDENT RESPONSE PLAYBOOKS TO DATA SECURITY PLATFORM

    Jan 22, 2019

    Varonis Systems announced version 7.0 of its Data Security Platform on Jan. 22, providing organizations with new capabilities to detect and respond to threats in the cloud and on-premises. The Varonis Data Security Platform 7.0 update adds new risk dashboards that can help to highlight potential iss...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58645864

    PRIORITIZING VULNERABILITIES IS KEY TO PATCHING SUCCESS, REPORT FIND

    Jan 22, 2019

    There is no shortage of software vulnerabilities but not all flaws have equal severity, and only a subset are essential to patch immediately. That's one of the core themes from a report released by Kenna Security and the Cyentia Institute on Jan. 22, titled, Prioritization to Prediction: Getting...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58655865

    SERVERS GRAB CLIENT FILES VIA MYSQL DESIGN FLAW

    Jan 22, 2019

    Attackers can potentially run a malicious MySQL server and gain access to connected data, according to a new security alert. MySQL has issued a security notice resulting from issues with the LOAD DATA LOCAL, noting that the “statement can load a file located on the server host, or, if the LOCA...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58665866

    SECURITY VC FUNDING HIT RECORD $5.3 BILLION IN 2018

    Jan 21, 2019

    It’s official. Cybersecurity venture capital funding hit a record $5.3 billion in 2018, according to Strategic Cyber Ventures. This is 20 percent higher than the $4.4 billion companies raised in 2017 and 81 percent higher than in 2016. But, as the VC firm warns, “this rate of investment ...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58575857

    TREND MICRO'S ZDI LOOKS TO ACQUIRE MORE VULNERABILITIES IN 2019

    Jan 18, 2019

    2018 was a big year for security vulnerabilities, and 2019 is on track to be even bigger, according to Trend Micro's Zero Day Initiative. ZDI is in the business of acquiring vulnerabilities from security researchers and then responsibly reporting them to vendors. In 2018, ZDI published 1,444 sec...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58485848

    NEW MALWARE STRAIN CAN EVADE AND UNINSTALL CLOUD SECURITY SOFTWARE, RESEARCHERS WARN

    Jan 18, 2019

    The good news: your organisation has finally gotten around to installing some top of the range cloud security tools. The bad news: malware has been developed which can evade detection from them. The nefarious discovery from threat actor Rocke was made by Palo Alto Networks Unit 42, with the security...

    CLOUD COMPUTING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58495849

    CYBEATS RELEASES IOT SECURITY, MONITORING APP ON PALO ALTO NETWORKS FRAMEWORK

    Jan 18, 2019

    IoT security startup Cybeats announced that its IoT monitoring and security app, deemed IoT Radar, is now available on the Palo Alto Networks Application Framework. This news comes about a month after the startup raised $3 million in a seed round. Cybeats is a Toronto-based company that was founded ...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58505850

    MICROSOFT ADDS AZUREDEVOPS BUG BOUNTY, OFFERS $20K REWARDS

    Jan 18, 2019

    Microsoft added a new bug bounty program that pays hackers to find security flaws in its software. This latest move targets Azure DevOps, Microsoft’s cloud platform for collaborating on code development. The program will pay between $500 and $20,000 for found eligible vulnerabilities in Azure ...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58565856

    ATTACKERS TAKE NEW APPROACH TO INSTALLING CRYPTOMINERS

    Jan 17, 2019

    Security technology on cloud servers is supposed to help block and prevent the installation of malware, but what happens when attackers figure out how to uninstall security technology as part of a hacking campaign? According to a report released on Jan. 17 by Palo Alto Networks' Unit 42 security...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58405840

    WHY ENTERPRISES NEED TO CRACK DOWN ON LAZY LOGINS

    Jan 17, 2019

    Everybody does it. You do it. It’s the easy way out, but it’s also an easy way to a security blunder. The “it” in this case is using your email address as your user name for websites and other places where a login is necessary. Chances are you use one of a couple email addres...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58415841

    RESEARCHERS FIND 87GB TROVE OF BREACHED LOG-INS

    Jan 17, 2019

    A leading security researcher has warned of a major trove of breached data being shared on hacking sites, containing over 772 million unique email addresses and more than 21 million unique passwords. Troy Hunt, owner of the Have I Been Pwned (HIBP) breached credentials site, explained that he was al...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58425842

    IOT SECURITY MARKET SET TO GROW OVER 25 PERCENT ANNUALLY

    Jan 16, 2019

    A report predicts a growth rate of over 25 percent annually in the North American IoT security market. The market was valued at $1.7 billion in 2018 and is expected to reach $5.2 billion by 2023 at a compound annual growth rate (CAGR) of 25.1 percent, according to the report ‘Internet of Thing...

    IOT TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58335833

    IT TEAMS HAVE ONE YEAR TO MOVE OFF WINDOWS 7

    Jan 16, 2019

    The UK’s National Cyber Security Centre (NCSC) has urged organizations still on Windows 7 to plan now for the end of extended support in a year’s time. The GCHQ arm reminded IT managers that the operating system will no longer receive free updates from January 14 2020. That will mean any...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58345834

    LESS THAN HALF OF BUSINESSES ARE ABLE TO DETECT IOT DEVICE BREACHES

    Jan 15, 2019

    A study conducted by Dutch software firm Gemalto reveals that only 48% of the businesses in the world are able to detect if any of their IoT devices suffers a breach. The survey, which was conducted among 950 IT and business decision makers across the globe, found that organisations are urging gover...

    IOT TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58235823

    KARAMBA SECURITY: VEHICLES FACE 300,000 ATTACKS PER MONTH

    Jan 15, 2019

    The scale of cyberattacks on connected cars has been revealed by Karamba Security, and it makes for a rather concerning read. Karamba set-up automotive electronic control units (ECUs) through which it’s been attracting internet attacks. In the last three months, the ECUs have been subjected to...

    IOT TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58245824

    SYNOPSYS IMPROVES COVERITY STATIC APPLICATION SECURITY TESTING

    Jan 15, 2019

    Synopsys announced on Jan. 15 that a new version of its Coverity Static Application Security Testing (SAST) technology is now available, providing organizations with enhanced software vulnerability analysis capabilities. Static analysis is an approach where code is examined for potential risks and v...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58265826

    SIX BEST PRACTICES FOR INCREASING AWS SECURITY IN A ZERO TRUST WORLD

    Jan 15, 2019

    Amazon Web Services (AWS) reported $6.6B in revenue for Q3, 2018 and $18.2B for the first three fiscal quarters of 2018. AWS revenue achieved an impressive 46% year-over-year net sales growth between Q3, 2017 and Q3, 2018 and 49% year-over-year growth for the first three quarters of the year. AWS&rs...

    CLOUD COMPUTING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58325832

    TOP WEB HOSTING SERVICES HAVE MAJOR SECURITY FLAWS

    Jan 14, 2019

    Security researcher Paulos Yibelo tested five of the world's biggest web hosting services for flaws and unveiled that all five were vulnerable. Not just 'vulnerable', but in fact so flawed that data mining and account takeover wouldn't even require breaking a sweat. Roughly a dozen f...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58255825

    MAJOR' GLOBAL CYBERATTACKS SURGED IN 2018

    Jan 14, 2019

    The number of 'significant' attacks jumped by more than 50 per cent in the last three years. ‘Significant’ cyberattacks, those targeting government agencies, defence companies and financial institutions, have grown by more than 50 per cent in the last three years. This is accordi...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58165816

    LINUX'S SYSTEMD HIT WITH THREE SECURITY HOLES

    Jan 14, 2019

    Admins and DevOps working with Linux machines will want to keep an eye out for patches for a trio of security vulnerabilities affecting systemd, the system and service manager that's primarily tasked with deciding what programs run when Linux boots. Specifically, the vulnerabilities are in syste...

    ITPRO TODAY
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58175817

    OPEN-SOURCE METASPLOIT FRAMEWORK 5.0 IMPROVES SECURITY TESTING

    Jan 14, 2019

    Among the most widely used tools by security researchers is the open-source Metasploit Framework, which has now been updated with the new 5.0 release. Metasploit Framework is penetration testing technology, providing security researchers with a variety of tools and capabilities to validate the secur...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58185818

    SOPHOS INTRODUCES LATERAL MOVEMENT PROTECTION TO XG FIREWALL TO STOP ADVANCING CYBERATTACKS

    Jan 13, 2019

    Sophos has announced that its next-generation Sophos XG Firewall now includes lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. The SophosLabs 2019 Threat Report discusses a rise in targeted ransomware. With the Sam...

    NETWORKS ASIA
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58065806

    WHY QUANTUM-RESISTANT ENCRYPTION NEEDS QUANTUM KEY DISTRIBUTION FOR REAL SECURITY

    Jan 12, 2019

    The idea behind the use of quantum computers to break encryption lies in the fact that the encryption keys used by current encryption methods depend on a secret key that is used to encrypt and decrypt the information that’s being protected. Those keys are long, random—or, more likely, al...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58085808

    THE SECURITY CHALLENGES OF MOVING ERP TO THE CLOUD

    Jan 11, 2019

    Enterprise resource planning software is a business-critical application for many organizations, and when moving to the cloud from on-premises deployments, there are some key security concerns that need to be considered, according to a study from the Cloud Security Alliance. The CSA study, titled En...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58095809

    MONGODB INSTANCE LEAKS 200 MILLION CHINESE CVS

    Jan 11, 2019

    A huge MongoDB database containing detailed CVs for over 202 million individuals has been found exposed online. The unprotected MongoDB instance was found via a simple BinaryEdge or Shodan search and was left without any password protection, according to Bob Diachenko, director of cyber risk researc...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58105810

    REDDIT LOCKS DOWN ACCOUNTS AFTER SECURITY INCIDENT

    Jan 10, 2019

    A large number of Reddit users have been locked out of their accounts as a precaution while the site’s admins investigate potential unauthorized access. Staffer “Sporkicide” would not disclose exactly how many users were affected by the move, but claimed in a post yesterday that &l...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58005800

    SAILPOINT TECHNOLOGIES: PRODUCT OVERVIEW AND ANALYSIS

    Jan 10, 2019

    SailPoint Technologies is an Austin, Texas-based provider of identity governance solutions, which is known to be one of the fastest-growing cybersecurity spending priorities. Founded in 2005, SailPoint holds a steadfast commitment to solving business problems with innovative identity governance solu...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=58075807

    FIREEYE UPDATES SERVER EMAIL SECURITY PLATFORM FOR ADVANCED THREATS

    Jan 09, 2019

    FireEye is updating its on-premises security capabilities with the launch of the FireEye Email Security - Server Edition 8.2 release on Jan. 9. The FireEye Email Security - Server Edition 8.2 provides organizations with new capabilities to detect advanced email threats, including executive impersona...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57915791

    WEB APPLICATION VULNERABILITIES CONTINUE TO GROW, IMPERVA REPORTS

    Jan 09, 2019

    2018 was not a good year for web application vulnerabilities, with 17,142 reported issues, according to a report released on Jan. 9 by Imperva. The 2018 tally for web application vulnerabilities represents a 21 percent year-over-year increase from 2017. There are multiple types of web applications v...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57925792

    SK TELECOM AIRS FIRST LIVE TV BROADCAST VIA 5G, CES 2019 TO SPOTLIGHT 5G

    Jan 09, 2019

    South Korean wireless telecommunications operator SK Telecom claims to have broadcast the world's first live television event over a commercial 5G network. SK Telecom used its 5G broadcasting solution dubbed 'T Live Caster' to air over entertainment channel 'XtvN' a New Year&rsqu...

    RF GLOBALNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57935793

    MICROSOFT KICKS OFF 2019 WITH MEDIUM PATCH LOAD

    Jan 09, 2019

    Microsoft started the new year yesterday by issuing fixes for a near half century of vulnerabilities, although only seven were rated critical. Many of these were remote code execution (RCE) bugs, with experts agreeing that CVE-2019-0547 should be top of the priority list. This RCE vulnerability in t...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57965796

    PHONE CARRIERS SELLING CUSTOMER LOCATION DATA

    Jan 09, 2019

    Bounty hunters are able to leverage a somewhat dubious skeptical service available through major telecom companies, including T-Mobile, AT&T, and Sprint, according to Motherboard. A researcher reportedly paid $300 to a bounty hunter who was then able to geolocate a phone down to a location in a ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57975797

    NHS DIGITAL CISO QUITS AFTER THREE MONTHS

    Jan 09, 2019

    NHS Digital’s first chief information security officer (CISO) has resigned just three months into the job, dealing a blow to efforts to improve cybersecurity across the UK’s health service. In a memo to staff seen by HSJ, NHS Digital deputy CEO, Rob Shaw, said that Robert Coles’ de...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57985798

    FIRM OFFERS $2M FOR IOS ZERO-DAY EXPLOITS

    Jan 09, 2019

    ontroversial exploit broker Zerodium has upped its bug bounties for the majority of desktop/server and mobile exploits, offering security researchers millions of dollars for their work. At the lower end, a Windows local privilege escalation or sandbox escape will now pay out $80,000, up from $50,000...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57995799

    IBM GROWS PATENT PORTFOLIO WITH CYBER-SECURITY INNOVATIONS

    Jan 08, 2019

    IBM announced on Jan. 8 that it was awarded 9,100 patents in 2018, once again topping the list for the most U.S. patents granted in a given year. A core component of IBM's patent haul in 2018 was in cyber-security innovation, with more than 1,400 granted patents. Among the security patents grant...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57815781

    ELECTION SECURITY BILLS FINALLY PROGRESSING IN CONGRESS

    Jan 08, 2019

    After years of contention about real and imagined security attacks on U.S. elections, the U.S. House of Representatives is expected to consider and then pass H.R. 1, also known as the “For the People Act of 2019,” which includes provisions that would improve election security and help st...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57825782

    FOUR CLOUD SECURITY PREDICTIONS FOR 2019: CONTAINERISATION, LOAD BALANCERS, AND MORE

    Jan 08, 2019

    The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While many companies had previously been afraid of making the move, as the open nature of the cloud makes it...

    CLOUD COMPUTING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57835783

    ESCALATING VALUE OF IOS BUG BOUNTIES HITS $2M THRESHOLD

    Jan 08, 2019

    In the escalating market for security vulnerabilities a new milestone has been recorded early in the new year, with $2 million now being offered for a remote Apple IOS exploit. The $2 million award is being offered by vulnerability acquisition firm Zerodium, which first achieved global notoriety for...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57845784

    YOUR SOCIAL MEDIA FORECAST FOR YEAR 2019 IS HERE AND IT’S NOT BUSINESS AS USUAL

    Jan 08, 2019

    Guest Post from Peter Davidson, a senior business associate striving to help different brands and startups to make effective business decisions and plan effective business strategies. After the successful conclusion of 2018, you must be planning with full energy to take your business to new heights ...

    IRISH TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57855785

    HOW MASTERCARD IS IMPROVING FRAUD DETECTION WITH IDENTITY CHECK

    Jan 07, 2019

    Online credit card fraud is a major concern for enterprises, consumers and vendors alike. One of the biggest brands in the payment card space is Mastercard, which has been quietly working on implementing technology it has branded Mastercard Identity Check, in an effort to help reduce fraud, while ma...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57715771

    PROTEGO LABS BOOSTS SERVERLESS SECURITY WITH OPEN-SOURCE PROJECT

    Jan 07, 2019

    While serverless technology is becoming increasingly widely used, there has been a lack of understanding when it comes to serverless security implications. That's a challenge that Protego Labs is looking to help solve with the release of a freely available open-source tool that helps organizatio...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57725772

    SECURING ENTERPRISE CROWN JEWELS: HOW TO PROTECT DATA AT DB LEVEL

    Jan 07, 2019

    Data breaches once again played a prominent role in this past year’s media coverage. While many organizations make it seem like an unavoidable fact, the reality is that there are a plenty of things that enterprises can do right now to help prevent unauthorized access to their systems and data....

    CYBER SECURITY NEWS, CYBER-ATTACK NEWS, DATA SECURITY NEWS, CLOUD SECURITY NEWS, NETWORK SECURITY NEWS, ANTIVIRUS NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57735773

    THOUSANDS COMPLAIN ABOUT TV LICENSE PHISHING EMAILS

    Jan 07, 2019

    A highly convincing phishing email spoofed to appear as if sent from the UK’s TV Licensing authority has accrued thousands of complaints over the past three months. Action Fraud warned back in October that the scam email was designed to steal a user’s personal and financial details. &ldq...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57745774

    LA CITY SUES WEATHER APP OVER DATA COLLECTION

    Jan 07, 2019

    The City of Los Angeles has filed a lawsuit against a popular US-based weather app, alleging it illegally sells user data to third parties. LA city attorney, Mike Feuer, is claiming the Weather Channel app misled users in that most agreed to allow it access to their location data purely for personal...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57755775

    A LOOK BACK AT THE ISRAELI CYBER SECURITY INDUSTRY IN 2018

    Jan 04, 2019

    2018 saw a spate of major cyber attacks including the hacks of British Airways, Facebook and Marriott. Despite growing emphasis on and awareness of cyber threats, large organizations continue experiencing massive data breaches. And as the world becomes increasingly connected (cars and medical device...

    TECHCRUNCH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57625762

    MARRIOTT REVEALS NEW DETAILS IN STARWOOD DATA BREACH

    Jan 04, 2019

    Marriott International disclosed revised information on Jan. 4 about the massive data breach involving its Starwood Hotels division. The update includes both good and bad news about the impact from the data breach. First the good news: Originally Marriott reported on Nov. 30, 2018, that information ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57635763

    NEUSTAR BOLSTERS FRAUD DETECTION CAPABILITIES WITH TRUSTID

    Jan 04, 2019

    Neustar is improving its security capabilities with the addition of technology gained via the acquisition of caller authentication and fraud prevention vendor Trustid. Fraud can take many different forms, including caller fraud where unauthorized individuals attempt transactions or information retri...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57645764

    BIOMETRIC SECURITY CAN BE HACKED, BUT IT'S REALLY HARD TO DO

    Jan 04, 2019

    At the end of December 2018, security researchers in Leipzig, Germany, demonstrated at a security conference their method of hacking a biometric security system that depends on reading the pattern of blood vessels in the palm of the hand. This method of vein authentication involves reading the detai...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57655765

    PREDICTIONS 2019: SECURITY THREATS WILL ONLY GET NASTIER

    Jan 03, 2019

    Hardly a week went by in 2018 without news of a major data leak or security breach. Ransomware and phishing were invasive, state-run hackers were working around the clock, passwords were leaking, new sophisticated malware attacks were spreading, data was breached and governments around the world onc...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57515751

    HACKERS THREATEN TO RELEASE 9/11 DATA 'TROVE'

    Jan 03, 2019

    A notorious hacking group is claiming to have put up for sale stolen legal and other documents relating to the 9/11 terrorist attacks. The individual(s) known as ‘The Dark Overlord’ claimed in a lengthy Pastebin notice to have hacked insurance giants Hiscox Syndicates and Lloyds of Londo...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57525752

    PASSWORD MANAGER USERS EXPOSED AFTER PRIVACY SNAFU

    Jan 03, 2019

    Data on over two million users of a password manager tool has been publicly exposed in another cloud storage misconfiguration incident. Abine said on Monday that 2.4 million users of its Blur product from prior to January 6 2018 were affected. As well as password management, it offers the ability to...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57535753

    RANSOM DEMAND ON LUAS WEBSITE LIKELY THE FIRST OF MANY IN 2019

    Jan 03, 2019

    With the website of Dublin’s tram service, Luas, down after an apparent cyber attack, one of the country’s leading cyber security firms is urging businesses and the public to ensure their computers have the protection they need against an increasing number or ransomware attacks. A messag...

    IRISH TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57545754

    CASTHACK EXPOSES GOOGLE CHROMECAST DEVICE USERS TO RISK

    Jan 03, 2019

    A pair of hackers have taken aim at vulnerable Google Chromecast media streaming devices, sending unauthorized content and messages to unsuspecting users. The attack, dubbed "CastHack," identifies Google Chromecast devices that have been exposed to the public internet. The two attackers, w...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57605760

    HACKERS HIJACK 70,000 GOOGLE CHROMECASTS THROUGH BUG – ALTHOUGH CHROMECAST WASN’T NONE THE WISER

    Jan 03, 2019

    It was reported earlier today that Hacker Giraffe has remotely gained access to the TVs and smart devices of tens-of-thousands of Google Chromecast users. In the hack, a pop-up was displayed that both warns of the exploit and links to a page listing the current number of affected devices. The messag...

    IRISH TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57615761

    HACKERS TARGET NORTH KOREAN DEFECTORS

    Jan 02, 2019

    Personally identifiable information (PII) on nearly 1000 defectors from North Korea has been stolen in a cyber-raid, the South Korean government revealed late last week. It’s believed that one of the 25 “Hana” support centers for defectors in the country was targeted by a classic p...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57415741

    HOW ENTERPRISES CAN AVOID THE RYUK RANSOMWARE WITH RIGHT STRATEGY

    Jan 02, 2019

    During the holiday period between Christmas and New Year’s in 2018, workers at a Tribune Co. newspaper location in South Florida found out that they couldn’t upload late-breaking sports scores to the portion of their CMS that handles printing and distribution. Later, other newspapers in ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57425742

    VIETNAM'S NEW CYBER LAW THREATENS FREE SPEECH

    Jan 02, 2019

    The Vietnamese government has passed a sweeping new cybersecurity law which critics claim will help the one-party state continue to crack down on free speech. The law will force internet companies like Facebook and Google to open offices in the country, store data on users locally and allow access t...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57435743

    USB TYPE-C TO BECOME MORE SECURE WITH AUTHENTICATION STANDARD

    Jan 02, 2019

    The security of USB-based connections and devices is taking a step forward, with the official launch of the USB Type-C Authentication Program on Jan. 2. USB devices have become ubiquitous in modern computing, and in recent years USB Type-C has been introduced on leading notebooks, smartphones and ot...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57445744

    HACKER HIJACKS THOUSANDS OF CHROMECASTS AND SMART TVS TO PLAY PEWDIEPIE AD

    Jan 02, 2019

    A hacker duo claims to have hijacked thousands of internet-exposed Chromecasts, smart TVs, and Google Home devices to play a video urging users to subscribe to PewDiePie's YouTube channel. The main hacker behind this hacking campaign --codenamed CastHack-- is known online as TheHackerGiraffe. Th...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57455745

    EU TO RUN BUG BOUNTY PROGRAMS FOR 14 FREE SOFTWARE PROJECTS

    Jan 02, 2019

    The European Union is offering a total of more than €850,000 – nearly $1 million – for vulnerabilities found in 14 widely used free and open source software projects. The announcement was made last week by Julia Reda, who represents the German Pirate Party in the European Parliament...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57345734

    FRENCH STARTUP OFFERS DARK WEB COMPASS, BUT NOT FOR EVERYONE

    Dec 31, 2018

    For years criminal websites shrouded in secrecy have thrived beyond the reach of traditional search engines, but a group of French engineers has found a way to navigate this dark web -- a tool they don't want to fall into the wrong hands. "We insist on this ability to say 'no',"...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57355735

    WHAT TO CONSIDER BEFORE DEVELOPING AN API SECURITY STRATEGY

    Dec 31, 2018

    Recent incidents at Salesforce, Facebook, Google+—not to mention the Equifax breach and the Cambridge Analytica scandal that plagued Facebook—point directly to the unsettling reality that API security is often an afterthought for enterprises. Such incidents serve as a major wake-up call ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57315731

    LOOKING BACK AT THE TOP CYBER-SECURITY INCIDENTS OF 2018

    Dec 31, 2018

    As 2018 draws to a close, it's a good time to reflect on the year that was in cyber-security, to learn from past mistakes and identify trends that will likely continue into the new year. 2018 saw no shortage of major breaches, new critical vulnerabilities and policy changes that enterprise IT or...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57335733

    WHAT ENTERPRISES CAN EXPECT FOR CYBERSECURITY IN 2019

    Dec 28, 2018

    2018 was a banner year in cybersecurity. The breaches were many, the remedies were few, and the cost of doing nothing went up. But there is hope on the horizon as new methods of authentication are beginning to show up, old practices are discarded, and as the threat landscape becomes clearer. But the...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57325732

    CISCO PATCHES A CRITICAL PATCH ON ITS SOFTWARE-LICENSE MANAGER

    Dec 27, 2018

    Cisco this week said it patched a “critical” patch for its Prime License Manager (PLM) software that would let attackers execute random SQL queries. The Cisco Prime License Manager offers enterprise-wide management of user-based licensing, including license fulfillment. Released in Novem...

    COMPUTERWORLD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57235723

    CYBERSECURITY 101: HOW TO PROTECT YOUR CELL PHONE NUMBER AND WHY YOU SHOULD CARE

    Dec 25, 2018

    Assuming you have your strong passwords in place and your two-factor authentication set up, you think your accounts are now safe? Think again. There’s much more to be done. You might think your Social Security or bank account numbers are the most sensitive digits in your life. Nowadays, hacker...

    TECHCRUNCH
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57215721

    OVER 19,000 ORANGE MODEMS ARE LEAKING WIFI CREDENTIALS

    Dec 24, 2018

    Over the weekend, a security researcher has discovered that nearly 19,500 Orange Livebox ADSL modems are leaking WiFi credentials. Troy Mursch, co-founder of Bad Packets LLC, says his company's honeypots have detected at least one threat actor scanning heavily for Orange modems. Scans started Fr...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57245724

    NEARLY 20,000 ORANGE MODEMS LEAKING WI-FI PASSWORDS

    Dec 24, 2018

    Nearly 20,000 Orange modems are being targeted thanks to a vulnerability leaking their SSID and Wi-Fi passwords, researchers at Bad Packets have warned. The firm’s honeypots first picked up the attack traffic targeting Orange Livebox ADSL modems. After conducting a simple Shodan search, chief ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57155715

    RESEARCHER PUBLISHES PROOF-OF-CONCEPT CODE FOR CREATING FACEBOOK WORM

    Dec 22, 2018

    A Polish security researcher has published today details and proof-of-concept code that could be used for creating a fully functional Facebook worm. This code exploits a vulnerability in the Facebook platform that the researcher --who goes online under the pseudonym of Lasq-- has seen being abused i...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57255725

    CYBER-PHYSICAL CONVERGENCE EXPANDS ATTACK SURFACE

    Dec 21, 2018

    In the last year, Hong Kong has seen the growing convergence of IT systems and OT systems as more companies try to drive digital transformation deeper into their organization. “The cyber-physical convergence, especially on the use of IoT (Internet of Things), is actually happening and keeps gr...

    COMPUTERWORLD
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57225722

    PRIVACY LEGISLATION MIGHT HAVE STOPPED FACEBOOK

    Dec 20, 2018

    In the aftermath of an extensive New York Times investigation into Facebook’s data privacy regulations and whether the company violated the privacy and public policy regulations of the Federal Trade Commission, Sen. Amy Klobuchar (Minn.) said that it is time for her colleagues to step up. Duri...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57035703

    PIVOTAL CLOUD FOUNDRY 2.4 BOOSTS SECURITY WITH COMPLIANCE SCANNER

    Dec 20, 2018

    Pivotal is releasing version 2.4 of its Pivotal Cloud Foundry (PCF) platform on Dec. 20, providing organizations with a host of new capabilities to manage and deploy cloud-native applications. PCF is Pivotal's commercial distribution, based on the open-source Cloud Foundry project, which provide...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57045704

    MICROSOFT PATCHES OUT-OF-BAND ZERO-DAY SECURITY FLAW FOR IE

    Dec 20, 2018

    Users of Microsoft's Windows operating system have grown accustomed to a regular, predictable cadence for patches—on the first Tuesday of every month. On Dec. 19, Microsoft broke that cadence with an emergency out-of-band update for its Internet Explorer (IE) web browser. The reason is sim...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57055705

    MCAFEE: IOT MALWARE INCREASING ALONGSIDE 480 THREATS PER MINUTE

    Dec 20, 2018

    Shocking research from McAfee Labs highlights the increasing prevalence of IoT malware as the cybersecurity firm detects 480 new threats per minute. Years of putting functionality before security and rushing to market have led to many compromisable devices. The Mirai IoT botnet attack in 2016 was a ...

    IOT TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57115711

    US INDICTS CHINESE HACKERS IN MSP NETWORK SCHEME

    Dec 20, 2018

    The U.S. Justice Department today charged two Chinese-state-sponsored hackers that it says infiltrated managed service provider (MSP) networks and stole companies’ intellectual property and sensitive data. While the U.S. government didn’t name any of the companies whose networks were com...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57125712

    NEW WAVE OF HMRC SCAM CALLS HITS UK

    Dec 20, 2018

    Security experts are warning of a new HMRC scam using a threatening automated message in a bid to trick taxpayers into paying a ‘fine.’ The scam calls appear designed to cash-in on the busy end-of-year period in the UK where taxpayers look to get their affairs in order before the self-as...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57015701

    CLICK2GOV BREACH PAYMENT CARDS SOLD ON DARK WEB

    Dec 19, 2018

    In August 2017, Click2Gov software, a payment technology widely used by local governments to process utility payments, was the victim of a breach in which Oceanside, California, was the first in a long line of compromised municipalities. Many of the payment cards stolen from the compromised records ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57025702

    A RESTAURANT'S NEXT BIG FINANCIAL RISK ISN'T BAD REVIEWS — IT'S DATA BREACHES

    Dec 19, 2018

    As hackers find new ways to gather coveted personal information, restaurants are quickly becoming a target for the internet underworld. Several customer accounts were breached on Dunkin's DD Perks mobile rewards program in November, but Dunkin' certainly wasn't the only chain to get hit ...

    CIO DIVE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57135713

    FACEBOOK REPORTEDLY GATHERING PERSONAL DATA FROM TINDER, PREGNANCY+, OTHER APPS

    Dec 19, 2018

    Facebook may be gathering some of your most personal information. Android apps like Tinder, Grindr and Pregnancy+ are sharing sensitive user information with Facebook, according to a Wednesday report from German mobile security company Mobilsicher. The information reportedly includes dating profiles...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=57145714

    FINALLY, A MEANINGFUL CONGRESSIONAL REPORT ON STEMMING CYBERSECURITY ATTACKS

    Dec 12, 2018

    As a new Congress arrives next month, expect a whirlwind of activity on the cybersecurity and privacy fronts. From major data breaches to the growing consumer data privacy morass, the frenetic pace of Washington developments will heat up. Most of this activity will obscure the fundamentals of why we...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56915691

    NEW VARIANT OF SHAMOON MALWARE UPLOADED TO VIRUSTOTAL

    Dec 12, 2018

    A new variant of the destructive Shamoon malware was uploaded to VirusTotal this week, but security researchers haven’t linked it to a specific attack yet. Also referred to as DistTrack, the sophisticated malware was initially observed in attacks against Saudi Arabian and other oil companies i...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56925692

    GRAMMARLY LAUNCHES PUBLIC BUG BOUNTY PROGRAM

    Dec 12, 2018

    Grammarly, the popular service for checking grammar and spelling, this week announced the launch of a public bug bounty program. Grammarly has been running a private bug bounty program with HackerOne for more than a year. The program has nearly 1,500 participants and resulted in payouts totaling $50...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56935693

    TOP 10 WORST PASSWORD FAILS OF 2018

    Dec 12, 2018

    The 2018 worst password fails, by that Dashlane means worst offenders this year, are: 1. Kanye West for unlocking his iPhone on TV in the White House with 000000. 2. The Pentagon for protecting weapon systems with default passwords, as well have having such pitiful admin passwords that the GAO audit...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56945694

    AI SET TO SUPERCHARGE PHISHING IN 2019

    Dec 12, 2018

    The coming year will see a mix of old and new as phishing is supercharged with AI but reported vulnerabilities continue to cause organizations problems, according to Trend Micro. The security giant claimed in its predictions report this week that phishing will continue to grow in popularity as explo...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56955695

    ADOBE PATCHES 87 VULNERABILITIES IN ACROBAT SOFTWARE

    Dec 11, 2018

    The December 2018 Patch Tuesday updates released by Adobe address a total of 87 vulnerabilities affecting the company’s Acrobat software. The vulnerabilities impact the Windows and macOS versions of Acrobat and Acrobat Reader DC (Continuous and Classic 2015 tracks), and Acrobat and Acrobat Rea...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56825682

    WINDOWS KERNEL VULNERABILITY EXPLOITED IN ATTACKS

    Dec 11, 2018

    Microsoft’s Patch Tuesday updates for December 2018 address nearly 40 vulnerabilities, including a zero-day flaw affecting the Windows kernel. The actively exploited vulnerability, tracked as CVE-2018-8611, has been described by Microsoft as a privilege escalation issue related to the failure ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56835683

    RESEARCHERS FIND OVER 40,000 STOLEN LOGINS FOR GOVERNMENT PORTALS

    Dec 11, 2018

    Russian cybersecurity firm Group-IB discovered login credentials for over 40,000 accounts that unlock government services in more than 30 countries. The credentials were harvested via phishing attacks that distributed spyware tools such as Pony Formgrabber, AZORult, and Qbot. It is believed the logi...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56845684

    NEW GOOGLE+ BUG MOVES SITE END DATE FORWARD

    Dec 11, 2018

    Google is speeding up the closure of its unpopular social networking platform after discovering a new bug affecting over 52 million users. The tech giant announced in October that it would be shutting Google+ in August 2019. However, that date has been brought forward to April next year, while its A...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56855685

    NEW MAC MALWARE COMBINES OPEN-SOURCE BACKDOOR AND CRYPTO-MINER

    Dec 10, 2018

    A recently discovered piece of malware targeting Mac systems is a combination of two open-source programs, Malwarebytes security researchers warn. Detected as DarthMiner, the threat is distributed through an application called Adobe Zii, which supposedly helps in the piracy of various Adobe programs...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56715671

    NEW BUG PROMPTS EARLIER END TO GOOGLE+ SOCIAL NETWORK

    Dec 10, 2018

    Google said Monday it will close the consumer version of its online social network sooner than originally planned due to the discovery of a new software bug. The Google+ social network will close in April -- four months earlier than planned -- and the internet giant will focus on operating a version...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56725672

    RESEARCHERS FIND A DOZEN UNDOCUMENTED OPENSSH BACKDOORS

    Dec 10, 2018

    ESET security researchers have discovered 12 new OpenSSH backdoor families that haven’t been documented before. The Secure Shell (SSH) network protocol allows the remote connection of computers and devices. The portable version of OpenSSH is implemented in almost all Linux distributions, and a...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56735673

    HOW GOOGLE IS IMPROVING KUBERNETES CONTAINER SECURITY

    Dec 10, 2018

    The open-source Kubernetes container orchestration project has become increasingly important in recent years as organizations rely on it to deploy applications. With the increased reliance has come increased scrutiny on security, especially at Google, which hosts a managed Kubernetes service called ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56745674

    SOPHOS CENTRAL INTEGRATES FIREWALL MANAGEMENT TO IMPROVE SECURITY

    Dec 10, 2018

    Sophos announced on Dec. 10 that it is bringing its XG Firewall to the Sophos Central Management service, enabling organizations to manage security in an integrated approach from a central management dashboard. The integrated capability is now available in early access for Sophos customers and will ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56755675

    DEEPPHISH PROJECT SHOWS MALICIOUS AI IS NOT AS DANGEROUS AS FEARED

    Dec 07, 2018

    Artificial intelligence (AI) is increasingly becoming a de facto necessity for cybersecurity. The asymmetric nature of cyberattacks simply overwhelms traditional manual analyst defenses, and organizations must increasingly use AI and machine learning (ML)-enhanced technologies to detect known attack...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56615661

    HOW OPEN POLICY AGENT WORKS TO SECURE CLOUD-NATIVE WORKLOADS

    Dec 07, 2018

    A core element of IT security is having proper policies in place that define what is and what isn't allowed for a given process or entity. In the cloud-native world, where there are multiple distributed elements that can live in different deployment modalities, the challenge of defining and impl...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56625662

    UK CONSUMERS HAVE LOST £500 EACH THROUGH ONLINE CRIME

    Dec 07, 2018

    Two-fifths of UK consumers have been a victim of cybercrime with phishing topping the list, according to new research from GMX. The email provider polled over 2000 Brits last month to better understand the impact and extent of online threats. It found that half of those netizens affected lost money ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56635663

    RESEARCHERS TAKE AN AI APPROACH TO TEXT CAPTCHAS

    Dec 07, 2018

    Researchers at Lancaster University in the UK and Northwest University and Peking University in China have found a way to get around CAPTCHA security with new artificial intelligence, according to research published in a paper titled Yet Another Text Captcha Solver: A Generative Adversarial Network ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56645664

    UNDER FIRE HUAWEI AGREES TO UK SECURITY DEMANDS: REPORT

    Dec 07, 2018

    Embattled Chinese telecoms giant Huawei has agreed to British intelligence demands over its equipment and software as it seeks to be  part of the country's 5G network plans, the FT reported Friday. Huawei executives met senior officials from Britain's National Cyber Security Centre (NCS...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56695669

    APPLE FIXES PASSCODE, REMOTE CODE EXECUTION FLAWS IN IOS AND MACOS

    Dec 06, 2018

    Apple released a series of updates on Dec. 5 to its desktop and mobile operating systems, patching serious vulnerabilities that could have exposed users to risk. Among the updates released by Apple are iOS 12.1.1, macOS Mojave 10.14.2 and Safari 12.0.2. The bugs fixed across the updates include priv...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56515651

    CENSYS TO EXPAND INTERNET SCANNING FOR THREAT HUNTING

    Dec 06, 2018

    Visibility is key for IT security professionals trying to figure out the nature of a given cyber-security threat. While having visibility into an organization's environment is one thing, having visibility into the entirety of the internet is another, which is where Censys fits in. Censys has its...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56525652

    BT STRIPS HUAWEI FROM 3G AND 4G CORE

    Dec 06, 2018

    BT and Huawei have sought to play down speculation that the former is stripping the Chinese telecoms giant’s equipment from its networks over security concerns. The UK telco group said it is removing Huawei infrastructure from its core 3G and 4G networks to meet existing policy, which will als...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56535653

    REPUBLICAN PARTY BREACHED IN MAJOR CYBER-ATTACK – REPORT

    Dec 06, 2018

    The chief campaign organization of the Republican Party has been hacked and thousands of emails from senior aides compromised over the period of several months, it has emerged. In an incident reminiscent of the notorious cyber-attack on the Democratic National Committee (DNC) ahead of the 2016 presi...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56545654

    GOOGLE PATCHES MORE THAN 50 ANDROID VULNERABILITIES IN DECEMBER

    Dec 06, 2018

    Google this week released a set of security patches for Android, to address over 50 vulnerabilities in the mobile operating system. The most severe of the security bugs is a critical issue in Media framework that could be exploited by remote attackers to execute arbitrary code within the context of ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56555655

    HACKERS GET INTO NATIONAL REPUBLICAN CONGRESSIONAL COMMITTEE'S EMAIL SYSTEM

    Dec 05, 2018

    “Thousands of emails were stolen” from four senior aides to the National Republican Congressional Committee (NRCC), the campaign arm for House Republicans, during the 2018 midterm campaign. MSSP first detected the hack and then CrowdStrike was brought into it in April to investigate the ...

    CSO
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56815681

    BUSINESSES WARNED ON WINTER PHISHING SCAMS

    Dec 05, 2018

    Winter is phishing season, and organisations and individuals alike should be extra vigilant during the holidays. This is according to a new report from F5 Labs, which claims that fraud incidents in October, November, and December usually jump more than 50 per cent, compared to a yearly average. Most...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56435643

    KUBERNETES HIT BY MAJOR SECURITY FLAW

    Dec 05, 2018

    A serious flaw in Kubernetes has been identified, and this one is so big that you should stop using it and update, immediately. Dubbed CVE-2018-1002105, the flaw allows anyone to establish a connection through the Kubernetes application programming interface (API) server to a backend server. Once co...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56445644

    RUSSIAN HOSPITAL TARGETED WITH FLASH ZERO-DAY AFTER KERCH INCIDENT

    Dec 05, 2018

    Security updates released by Adobe on Wednesday for Flash Player patch two vulnerabilities, including a critical flaw exploited by a sophisticated threat actor in attacks aimed at a healthcare organization associated with the Russian presidential administration. The attack may be related to the rece...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56455645

    IOT BACKBONE IS RIDDLED WITH SECURITY ISSUES

    Dec 05, 2018

    Two popular IoT communications protocols are riddled with vulnerabilities and systemic issues which are exposing countless global organizations to industrial espionage, targeted attacks and DoS, according to Trend Micro. The security giant’s latest report, The Fragility of Industrial IoT&rsquo...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56465646

    GLOBAL SEARCH MARKETING AGENCY, DIRECTIVE, ANNOUNCES COMPLETE REBRANDING

    Dec 05, 2018

    Directive, the leading B2B and enterprise search marketing agency, announced today the launch of their new branding to reflect their evolution into a global search marketing agency. Directive’s unique approach to search marketing has positioned the company as the agency of choice for leading B...

    SOURCE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=66356635

    HOUSE REPUBLICAN CAMPAIGN COMMITTEE WAS HACKED DURING 2018 ELECTION

    Dec 04, 2018

    The National Republican Congressional Committee was hacked during the 2018 US midterm elections. The breach, first reported by Politico, exposed thousands of emails to an unknown hacker. "The NRCC can confirm that it was the victim of a cyber intrusion by an unknown entity," Ian Prior, a s...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56355635

    NEW RANSOMWARE DEMANDS PAYMENT OVER WECHAT PAY IN CHINA

    Dec 04, 2018

    Ransomware attacks may have dwindled since the destructive days of WannaCry and NotPetya last year, but a new one has struck mobile-centric China and it's asking for ransom through one of the country's most popular methods of payment. Over 20,000 computers have fallen victim to an unnamed ra...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56365636

    MALWARE DROPPER SUPPORTS A DOZEN DECOY DOCUMENT FORMATS

    Dec 04, 2018

    A recently discovered malware dropper has the ability to use nearly a dozen decoy document file formats to drop various payloads, Palo Alto Networks security researchers warn. Dubbed CARROTBAT, the customized dropper is being used to deliver lures primarily pertaining to the Korean region, revolving...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56375637

    RUSSIAN RANSOMWARE BROKERS SCAM VICTIMS

    Dec 04, 2018

    Security researchers have discovered cybersecurity scammers in Russia are generating hundreds of thousands of dollars in profits by falsely claiming to be able to unlock encrypted files. Check Point explained that one ‘IT consultancy’ named Dr Shifro is promising customers it can help th...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56425642

    PHISHING CAMPAIGN DELIVERS FLAWEDAMMYY, RMS RATS

    Dec 04, 2018

    A new campaign delivering various remote access Trojans (RATs) is likely the work of a known Dridex/Locky operator, Morphisec security researchers warn. Dubbed Pied Piper, the campaign targets users in multiple countries and is likely operated by TA505, the threat group known to have orchestrated la...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56275627

    DATA BREACHES CAN SUCKER-PUNCH YOU. PREPARE TO FIGHT BACK

    Dec 03, 2018

    When a big data breach makes the news, there's one thing that can get lost in the noise -- the harm that hacking causes regular people like you. Experts tend to focus on the number of people whose records hackers stole, or whether the breached company could have prevented the hack. Those are imp...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56285628

    CISCO, AT&T, INTEL PROMOTE BEST ANTI-BOTNET PRACTICES FOR COMPANIES

    Dec 03, 2018

    A new report recommends best practices for services providers, enterprises, and software and device manufacturers to protect against botnets and other automated distributed attacks. The Council to Secure the Digital Economy published the 2018 International Anti-Botnet Guide. It’s a trade assoc...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56295629

    KNOWING VALUE OF DATA ASSETS IS CRUCIAL TO CYBERSECURITY RISK MANAGEMENT

    Dec 03, 2018

    Understanding the value of corporate assets is fundamental to cybersecurity risk management. Only when the true value is known can the correct level of security be applied. Sponsored by DocAuthority and based on Gartner's Infonomics Data Valuation Model, Ponemon Institute queried 2,827 professio...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56305630

    NSA EXPLOITS NOT SILENT BUT ETERNALLY PROBLEMATIC

    Nov 29, 2018

    It’s been over a year since patches to protect against the leaked NSA exploits were released, yet Akamai has published research revealing the continued use of the Eternal family of exploits with evidence of a new version of the UPnProxy vulnerability targeting unpatched computers behind the ro...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56195619

    DELL RESETS USER PASSWORDS AFTER WEBSITE ATTACK

    Nov 29, 2018

    Dell announced late on Nov. 28 that its Dell.com customer-facing website was the victim of a cyber-attack. The attack was apparently discovered by Dell on Nov. 9, with attackers taking aim at usernames, email addresses and passwords that had been cryptographically hashed. According to Dell, it has n...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56205620

    ATTACKERS KEEN ON AUTOMATED BROWSERS

    Nov 29, 2018

    Google Chrome has long been a popular web browser, but since the introduction of the headless mode functionality, the browser has grow in popularity not only among software engineers and testers but also with attackers, according to Imperva. According to recently published research, "Headless C...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56215621

    ATTACKERS RUN ON DUNKIN'S DD PERKS REWARDS

    Nov 29, 2018

    Boston-based Dunkin’, the brand formerly known as Dunkin Donuts, has released a warning to its customers stating that DD Perks reward account holders were potentially hacked by a third party in a credential-stuffing attack wherein hackers were trying to steal the rewards points to sell and tra...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56225622

    INDUSTRY REACTIONS TO USPS EXPOSING USER DATA

    Nov 28, 2018

    Security blogger Brian Krebs revealed recently that an API used by the United States Postal Service (USPS) had a vulnerability that potentially exposed the data of 60 million customers. Krebs learned of the security hole from an unnamed researcher who had reported the issue to USPS over a year ago. ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56115611

    CYBER RISK EXCHANGE STARTUP CYBERGRX RAISES $30 MILLION

    Nov 28, 2018

    CyberGRX, a Denver, Colorado-based startup that has created what it calls a “global cyber risk exchange”, today announced that it has raised $30 million in Series C funding, bringing the total amount raised by the company to $59 million. Through its recently launched third-party cyber ri...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56125612

    IBM BRINGS ENHANCED DATA MODELS TO QRADAR ADVISOR WITH WATSON 2.0

    Nov 28, 2018

    IBM announced on Nov. 28 that it is expanding the capabilities of its QRadar Advisor with Watson platform to help organizations more rapidly understand attacker behaviors. The IBM QRadar Advisor with Watson 2.0 release is an artificial intelligence (AI) platform that enables organizations to collect...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56135613

    NOKIA’S SOFTWARE BIZ IS FIRMLY ROOTED IN SILICON VALLEY

    Nov 28, 2018

    Nokia is making its presence in Silicon Valley a bit more prominent with the addition of a new corporate campus in Sunnvale, California. Although the campus won’t be ready until the first half of 2020, the company’s intent is to bring together its 1,000 or so employees that are currently...

    SDXCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56185618

    MICROSOFT REVEALS MORE ON RECENT SECURITY HICCUPS

    Nov 27, 2018

    Remember that big outage that happened last week to Azure, Office 365 and Dynamic users? Well, Microsoft has shed some more light on what the underlying causes were. Publicly releasing root causes to the issue, Microsoft said there were three separate problems that led to the downtime. The first two...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56035603

    SCAM WEBSITES ARE USING THAT GREEN HTTPS PADLOCK TO FOOL YOU

    Nov 27, 2018

    You may have heard you should look for the padlock symbol at the top of a website before entering your password or credit card information into an online form. It's well-meaning advice, but new data shows it isn't enough to keep your sensitive information secure. As it turns out, fraudsters ...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56045604

    CRYPTOCURRENCY-STEALING CODE DISTRIBUTED VIA POPULAR LIBRARY

    Nov 27, 2018

    The popular EventStream Node.js library was recently modified to fetch malicious code designed to steal crypto-currencies. Designed as a toolkit to make creating and working with streams easy, the JavaScript package has around two million downloads a week, which makes it a valuable resource to appli...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56055605

    AWS BOOSTS SERVERLESS SECURITY WITH FIRECRACKER MICROVMS

    Nov 27, 2018

    Amazon Web Services is looking to further accelerate the adoption of serverless computing with the announcement on Nov. 26 at its re:Invent conference of its new open-source Firecracker lightweight virtualization technology. There has long been a debate about whether or not it is necessary to run co...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=56065606

    WHAT IS WINDOWS HELLO? MICROSOFT’S BIOMETRICS SECURITY SYSTEM EXPLAINED

    Nov 26, 2018

    Windows Hello is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition. The sign-in mechanism is essentially an alternative to passwords and is widely con...

    ITNEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55955595

    ALIBABA RESTRUCTURES AMIDST CLOUD COMPUTING PUSH AND GROWTH

    Nov 26, 2018

    Alibaba Group Chief Executive Daniel Zhang announced that the company would be restructuring its cloud business unit and its Tmall e-commerce business. This comes just weeks after Zhang told CNBC that Alibaba Cloud would be the group’s main business in the future. Alibaba will rename its cloud...

    SDNCENTRAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55965596

    RESEARCHERS USE SMART BULB FOR DATA EXFILTRATION

    Nov 26, 2018

    Researchers with software risk measurement and management company Checkmarx were able to create two mobile applications that abuse the functionality of smart bulbs for data exfiltration. For their experiment, the researchers used the Magic Blue smart bulbs, which work with both Android and iOS, and ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55975597

    DOS VULNERABILITIES IMPACT LINUX KERNEL

    Nov 26, 2018

    Two recently disclosed Linux kernel vulnerabilities that remain unpatched could be exploited for local denial-of-service (DoS). The flaws, both which were made public last week, impact Linux kernel 4.19.2 and previous versions. Both represent NULL pointer deference bugs that can be exploited by loca...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55985598

    US SAYS CHINA INCREASED HACKING OVER TRADE DISPUTE

    Nov 23, 2018

    In advance of a meeting between US President Donald Trump and China's President Xi Jinping, a US government report made claims that China had increased hacking attempts in an effort to steal American technology and shows no sign of stopping or slowing its cyber-theft practices, according to the ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55865586

    MICROSOFT TAKES ANOTHER STEP TOWARDS KILLING PASSWORDS

    Nov 22, 2018

    People looking to log into their Microsoft accounts no longer need passwords to do so. The Redmond giant has announced today that it is supporting passwordless user authentication, which uses biometrics, the Microsoft Authenticator app, or a FIDO2-compatible device. A whole swathe of Microsoft servi...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55885588

    USPS REPORTEDLY FIXES WEBSITE BUG THAT EXPOSED DATA OF 60M USERS

    Nov 22, 2018

    Just in time for the holiday shopping season, it appears the US Postal Service has fixed a security flaw that allowed all USPS.com account holders, some 60 million people, to see personal details of fellow users. Cybersecurity expert Brian Krebs wrote about the bug on Wednesday, noting that he was c...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55935593

    SIGNIFICANT LACK IN AWARENESS OF IOT SECURITY AMONG IT LEADERS, STUDY FINDS

    Nov 21, 2018

    A survey conducted by IT security firm Trend Micro has revealed that 86% of IT and security decision makers around the world believe their organisations need to enhance their awareness of IoT threats. This is due to significant lack of knowledge which accompanies rising threat levels and security ch...

    IOT TECH NEWS
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55805580

    FACEBOOK BOOSTS BUG BOUNTY PAYOUTS FOR ACCOUNT TAKEOVER FLAWS

    Nov 21, 2018

    Facebook has faced multiple challenges over the course of 2018 as it has struggled with inauthentic user behavior, abuse of private information and outright attacks where user accounts were hijacked. In an effort to improve user account security and mitigate hijacking threats, Facebook announced on ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55815581

    ATTACKERS EXPLOIT RECENTLY PATCHED POPULAR WORDPRESS PLUGIN

    Nov 21, 2018

    Recently patched vulnerabilities in the popular AMP for WP plugin are being targeted in an active Cross-Site Scripting (XSS) campaign, Wordfence reports. With over 100,000 installs, the plugin adds Accelerated Mobile Pages (Google AMP Project) functionality to websites, which makes them faster for m...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55825582

    HACKERS LINKED TO RUSSIA IMPERSONATE US OFFICIALS

    Nov 20, 2018

    In a targeted campaign directed at multiple organizations across law enforcement, media, pharmaceutical and other public sectors, hackers with alleged ties to the Russian government have been trying to infiltrate US government computers and networks, according to a new report published by FireEye. M...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55745574

    PORTSHIFT PLATFORM LOOKS TO SECURE APPLICATION IDENTITY IN THE CLOUD

    Nov 20, 2018

    Assigning identity to applications has long been a challenge for organizations, and it's one that startup Portshift is looking to help solve. Portshift officially launched on Nov. 20, backed by Israeli cyber-security accelerator Team8 and $5.3 million in seed funding. Portshift's core techno...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55755575

    AWS LAUNCHES NEW SECURITY OFFERING WHICH MITIGATES S3 MISCONFIGURATIONS – IF CUSTOMERS GET IT RIGHT

    Nov 20, 2018

    Amazon Web Services (AWS) has announced extra steps to ensure customers’ S3 buckets don’t become misconfigured – but don’t assume responsibility has been taken away from the customer. The new service, Amazon S3 Block Public Access, can work at the account level, on individual...

    CLOUD COMPUTING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55765576

    TP-LINK PATCHES REMOTE CODE EXECUTION FLAWS IN SOHO ROUTER

    Nov 19, 2018

    Vulnerabilities recently addressed by WiFi device maker TP-Link in its TL-R600VPN small and home office (SOHO) router could allow remote code execution, Cisco Talos security researchers warn. The issues were mainly caused by lack of input sanitization and parsing errors. Lack of proper input sanitiz...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55685568

    IS YOUR DATA BREACH RESPONSE PLAN READY?

    Nov 19, 2018

    Fifty-six percent of organizations experienced a data breach involving more than 1,000 records over the past two years, and of those, 37 percent occurred two to three times and 39 percent were global in scope, according to Experian. In 2017 in particular, there were more than 5,000 reported data bre...

    SECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55695569

    SONICWALL LAUNCHES SD-WAN, RISK METRICS AND NEW UTM HARDWARE

    Nov 19, 2018

    SonicWall is adding multiple new features to its product portfolio, in a bid to help organizations further secure their on-premises and hybrid cloud assets against threats. Among the new features coming to SonicWall's Capture Cloud Platform are zero-touch deployment options and software-defined ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55705570

    TEXAS HOSPITAL BECOMES VICTIM OF DHARMA RANSOMWARE

    Nov 19, 2018

    The Altus Baytown Hospital (ABH) has revealed a ransomware outbreak which may have led to the leak of patient data. In a statement on its website, the Texas-based hospital said that ABH discovered an unauthorized threat actor rifling through the organization's systems on roughly September 3. The...

    ZDNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55945594

    DRIDEX/LOCKY OPERATORS UNLEASH NEW MALWARE IN RECENT ATTACK

    Nov 16, 2018

    The threat actor(s) behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT), Proofpoint security researchers warn. Known as TA505, the attackers have been using malware dubbed tRat, which was written in Delphi and is modular in nature. The new piece of malware was fir...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55575557

    SAMSAM AND GANDCRAB ILLUSTRATE EVOLUTION OF RANSOMWARE

    Nov 16, 2018

    2018 has seen a major divergence in the operation of ransomware: targeted versus ransomware as a service (RaaS). Two particular malware families have dominated each branch: SamSam (targeted) and GandCrab (RaaS). Targeted seeks high ransoms from relatively few victims, while RaaS seeks relatively sma...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55635563

    BLACKBERRY JUMPS INTO SECURITY WITH $1.4B CYLANCE ACQUISITION

    Nov 16, 2018

    A week after the first rumors of the acquisition began to surface, BlackBerry confirmed on Nov. 16 that it is acquiring cyber-security vendor Cylance for $1.4 billion in cash. The deal is expected to close before BlackBerry's fiscal year end in February 2019. Cylance is best known for its suite ...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55645564

    TEXT MESSAGE DATABASE REPORTEDLY LEAKED PASSWORD RESETS

    Nov 15, 2018

    A massive database managing millions of text messages was reportedly discovered unsecured, exposing sensitive information such as password resets and two-factor security codes. Vovox, a San Diego-based communications company maintained the server, which was left unprotected by password, offering any...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55615561

    GREATHORN EXPANDS EMAIL SECURITY PLATFORM

    Nov 15, 2018

    Waltham, MA-based GreatHorn has expanded its machine-learning phishing protection system into a complete email security platform. "This major new expansion of the Company's flagship solution," it announced on November 14, "addresses every potential stage of a phishing attack with ...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55625562

    NEARLY 70 PERCENT OF SMBS EXPERIENCE CYBER ATTACKS

    Nov 14, 2018

    The 2018 State of Cybersecurity in Small and Medium Size Businesses study, conducted by the Ponemon Institute, sponsored by Keeper Security, revealed that small businesses increasingly face the same cybersecurity risks as larger companies, but only 28 percent rate their ability to mitigate threats, ...

    SECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55505550

    APPLE'S SAFARI TESTS 'NOT SECURE' WARNING FOR UNENCRYPTED WEBSITES

    Nov 14, 2018

    Apple's Safari team, following Chrome's lead, has begun warning people when they're visiting websites that aren't protected by HTTPS encryption. The feature for now is only in Safari Technology Preview 70, a version of the web browser Apple uses to test technology it typically brings...

    CNET
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55555555

    THE BIGGEST CYBER THREATS TO WATCH OUT FOR IN 2019

    Nov 13, 2018

    Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019. Cryptojacking. If the recent and explosive growth of ransomware is an indication ...

    SECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55515551

    DESPITE RAISED AWARENESS, WORKER CYBER SECURITY PRACTICES AREN'T IMPROVING

    Nov 13, 2018

    Even though there has lately been a lot of talk about cybersecurity awareness amongst employees, their habits aren’t getting any better. As a matter of fact, SailPoint Technologies’ new report says they are actually getting worse. The enterprise identity governance company issued a repor...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55445544

    SAP PATCHES CRITICAL VULNERABILITY IN HANA STREAMING ANALYTICS

    Nov 13, 2018

    SAP this week published its November 2018 set of security patches, which include 11 new Security Patch Day Notes, along with 3 updates for previously released notes. This month’s Security Notes include a Hot News note, five notes rated High, and eight notes considered Medium risk. The most imp...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55455545

    TWISTLOCK IMPROVES CLOUD-NATIVE SECURITY WITH DISCOVERY TOOL

    Nov 13, 2018

    There is a simple truism in much of IT, and that is that organizations can't manage what they're not aware of. As organizations increasingly make use of distributed teams that use cloud-native services, there is a nontrivial risk of application sprawl. On Nov. 13, container security vendor T...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55465546

    CLOUDFLARE BRINGS PRIVACY TO MOBILE TRAFFIC WITH 1.1.1.1 DNS APP

    Nov 12, 2018

    Cloudflare is extending its 1.1.1.1 DNS service with new mobile capabilities it announced on Nov. 11. The 1.1.1.1 DNS service was first launched on April 1, providing a freely available service to help secure and accelerate DNS lookups. The initial service launch required users to make a change on t...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55385538

    ADOBE COLDFUSION VULNERABILITY EXPLOITED IN THE WILD

    Nov 09, 2018

    A recently patched remote code execution vulnerability affecting the Adobe ColdFusion web application development platform has been exploited in the wild by one or more threat groups, Volexity warned on Thursday. The security hole in question is tracked as CVE-2018-15961 and it was resolved by Adobe...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55405540

    THE MORRIS WORM TURNS 30

    Nov 09, 2018

    How the historic Internet worm attack of 1988 has shaped security - or not. Michele Guel was sound asleep on Nov. 3, 1988, when the call came at 3:30 a.m.: An unknown virus had infiltrated NASA Ames Research Laboratory's Sun Microsystems file servers and workstations and was sapping their resour...

    DARK READING
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55565556

    NEARLY 4,000 BREACHES DISCLOSED IN 2018

    Nov 08, 2018

    While it is likely that the breach activity of 2018 won’t reach the level of 2017, a look back at the first nine months suggests that 2018 is on pace to be another significant year for breaches, according to Risk Based Security. The 2018 Q3 Data Breach QuickView Report found that 3,676 data co...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55345534

    MOST IT SECURITY PROS UNDERESTIMATE PHISHING RISKS

    Nov 08, 2018

    Based on the results of a new survey, the vast majority of IT security pros fail to understand the actual risks of short-lived but dangerous phishing attacks on the web, said SlashNext. Conducted over a five day period, a query of 300 IT security decision makers in midsized firms in the US found tha...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55325532

    SYMANTEC BOOSTS SECURITY WITH JAVELIN, APPTHORITY ACQUISITIONS

    Nov 06, 2018

    Symantec continues to grow its portfolio of cyber-security products and services, most recently via the acquisitions of Javelin Networks and Appthority. Privately held Javelin Networks develops technology to help protect enterprises from attacks that target the widely deployed Microsoft Active Direc...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55335533

    U.S. CONSUMERS' SECURITY HABITS MAKE THEM VULNERABLE TO FRAUD

    Nov 06, 2018

    Despite almost half of U.S. consumers (49 percent) believing their security habits make them vulnerable to information fraud or identity theft, 51 percent admit to reusing passwords/PINs across multiple accounts such as email, computer log in, phone passcode, and bank accounts. That is according to ...

    SECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55395539

    FACEBOOK SEPARATES WORKPLACE FOR BUSINESS CUSTOMERS

    Nov 01, 2018

    Facebook has revealed it will be separating out its Workplace by Facebook platform from its main domain. The social network said that soon, businesses that pay for Workplace by Facebook (and according to Facebook October 2017 figures, there's 30,000 of them so far), will no longer log in through...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55265526

    USB DRIVES DELIVER DANGEROUS MALWARE TO INDUSTRIAL FACILITIES: HONEYWELL

    Nov 01, 2018

    Malware is still being delivered to industrial facilities via USB removable storage devices and some threats can cause significant disruptions, according to a report published on Thursday by Honeywell. The industrial giant last year launched SMX, a product designed to protect facilities from USB-bor...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55275527

    BLEEDINGBIT BLUETOOTH VULNERABILITIES EXPOSE WIFI APS TO RISK

    Nov 01, 2018

    Wireless access points from multiple vendors are potentially at risk thanks to a set of new Bluetooth flaws known as Bleedingbit. Bleedingbit was publicly announced by IoT security firm Armis on Nov. 1; it impacts Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) that are used in Cisco...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55285528

    PROPOSAL FOR CYBERSECURITY CIVILIAN CORPS GETS MIXED RECEPTION

    Oct 31, 2018

    Although the U.S has been engaged in cybersecurity for over a generation, "there continues to be organizational and human gaps that leave the nation insecure." Few people would disagree. What is less clear is any realistic and effective solution to the problem. Now the bi-partisan New Amer...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55225522

    LOGRHYTHM ADVANCES NEXTGEN SIEM SECURITY PLATFORM WITH SOAR FEATURES

    Oct 30, 2018

    Some organizations might think of Security Information and Event Management (SIEM) technology as only being concerned with log collection for security, but that's not what LogRhythm's NextGen SIEM system is all about. LogRhythm announced its 7.4 release on Oct. 30, enhancing the company'...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55175517

    CYBER IS A BOARDROOM ISSUE IN 2018

    Oct 30, 2018

    Based on studies and interviews with corporate board members and chief information security officers (CISOs), the Cyber Balance Sheet, published by Focal Point Data Risk and produced by the Cyentia Institute, found that boardrooms are engaging in more conversations about security. While the talks ab...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55185518

    CLOUD DATA IS MORE AT RISK THAN THOUGHT

    Oct 30, 2018

    Almost a quarter of all corporate data in the cloud can be categorised as sensitive, which might spell trouble for the company if the data gets stolen or somehow leaks. This is according to the latest McAfee Cloud Adoption and Risk Report which claims that the threat is even greater than originally ...

    ITPROPORTAL
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55215521

    IBM TO ACQUIRE OPEN SOURCE GIANT RED HAT FOR $34 BILLION

    Oct 29, 2018

    IBM said Sunday it has reached a deal to buy open source software company Red Hat for $34 billion, among the biggest tech mergers in history which the computing giant said would enhance its cloud offerings. If approved it will be the third biggest tech merger in history, according to business news s...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55125512

    LOGICAL BUG IN MICROSOFT WORD'S 'ONLINE VIDEO' ALLOWS CODE EXECUTION

    Oct 29, 2018

    Microsoft Office is impacted by a logical bug that allows an attacker to abuse the “online video” feature in Word to execute malicious code, Cymulate security researchers warn. The issue, which supposedly impacts all users of Office 2016 and older, can be exploited without special config...

    SECURITYWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55135513

    FACEBOOK IS MOVING FAST TO LIMIT COORDINATED INAUTHENTIC BEHAVIOR

    Oct 29, 2018

    Facebook is not sitting idly by while attackers attempt to influence the social network's users with inauthentic accounts and recently removed 82 pages that were followed by over 1 million accounts. Facebook is moving swiftly to disrupt and remove nation-state backed attackers from its social me...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55145514

    STATE OF SOFTWARE SECURITY MOVING FORWARD SLOWLY, VERACODE REPORTS

    Oct 25, 2018

    The state of software security in 2018 is marginally better than what it was in 2017, but there is still lots of room to improve, according to the 2018 State of Software Security report from CA's Veracode division. Among the high-level findings in the SOSS report is that 69 percent of discovered...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55095509

    US DEPARTMENT OF DEFENSE EXPANDS BUG BOUNTY EFFORTS

    Oct 24, 2018

    The Department of Defense has found value over the past two years in engaging with hackers and is now expanding its crowdsourced security efforts with HackerOne, Synack and Bugcrowd. While it might seem counterintuitive, the U.S. Department of Defense has been actively encouraging hackers to hack th...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55055505

    POCKET INET LEAVES 73 GB OF SENSITIVE DATA EXPOSED

    Oct 24, 2018

    A Washington State internet provider, Pocket iNet, left an AWS S3 server exposed online without a password, according to UpGuard. The UpGuard cyber-risk team reported that the information exposed included 73 gigabytes of downloadable data, which included passwords and other sensitive files, ranging ...

    INFOSECURITY MAGAZINE
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55065506

    NETSCOUT LAUNCHES ARBOR EDGE DEFENSE FOR ENTERPRISE DDOS SECURITY

    Oct 23, 2018

    Netscout Systems announced its Arbor Edge Defense security system on Oct. 23, providing organizations with automated inbound and outbound protection against threats. The AED technology, which Netscout is positioning as a stateless technology that blocks cyber-threats, is deployed at the perimeter of...

    EWEEK
    READ MORE

    https://Informationsecurity.report/news-article.aspx?ID=55015501

    ORACLE DOUBLES DOWN ON CLOUD SECURITY WITH CASB, WAF, DDOS PROTECTION

    Oct 23, 2018

    At OpenWorld 2018 on Oct. 23, Oracle announced a series of new cloud security technologies, providing organizations with enhanced capabilities to defend against attacks. Among the new security capabilities is a Web Application Firewall (WAF) to help protect Oracle Cloud Infrastructure customers from...

    EWEEK
    READ MORE

    https://Informationsecurity