Certificate authorities are granting SSL certificates to the owners of spoof domain names which are being used to phish customers of well-known retail and banking brands.
Break-in by Eastern European cybercriminals garners attention of US Secret Service
A malware-driven break-in and breach at the charity America's Thrift Stores may have compromised all sales transactions at the company between 1 September and 27 September, its CEO has admitted.
A spreadsheet containing personal information belonging to SRPS participants was accidentally emailed to a participant in another retirement plan serviced by SRPS.
4 hours ago Mapping an Adversary's Digital FootprintForbes View Synopsis+1
In the early 20th Century Dr. Edmond Locard famously observed "every contact leaves a trace," and that principle in forensics is no less true today in computer forensics. Everything we do online leaves a trail of IP addresses, of services used, of log files created. And whenever there is [...]
Google's searches add an extra layer of creepy by letting you listen back to exactly what you said -- and how you said it.
Verizon and it?s ?Limited? use of personal information They?re baaaack! Verizon's zombie cookies to track users across massive AOL ad network
In the 19980s, the Soviet Union bugged the IBM Selectric typewriters in the U.S. Embassy in Moscow. This NSA document discusses how the US discovered the bugs and what we did about it. Codename is GUNMAN.
Is this the world's first keylogger? Maybe.
WASHINGTON (AP) - The private email server Hillary Rodham Clinton used while secretary of state was connected to the Internet in ways that made it more vulnerable to hackers.
A paper published last week aims to demonstrate that developing rootkits for devices running Cisco IOS doesn't require advanced knowledge or the resources of a nation state.
4 hours ago MS15-081 - Critical: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3080790) - Version: 3.0Microsoft View Synopsis+1
Highly sophisticated bugs went undetected for 8 years during the Cold War.
2 hours ago - Tallinn Manual 2.0 (October 12, 2015)SANS Newsbites View Synopsis+1
Legal experts are drafting updates to the Tallinn Manual, a document that spells out how international law applies to cyberspace conflict.......
51 minutes ago A New Way for Tech Firms to Fight Orders to Unlock DevicesWIRED View Synopsis+1
A federal magistrate in New York declined to fall in step with the government's demand to access an Apple device seized by investigators, fanning the flames of a national debate.
The post A New Way for Tech Firms to Fight Orders to Unlock Devices appeared first on WIRED.
A recent Deloitte survey found that security, cloud, and analytics are growing in importance among mid-market businesses. Here are some of the highlights from the report.
8 hours ago E*Trade, Dow Jones: 7 Breach LessonsInfoRiskToday View Synopsis+1
Why Fraudsters Target Personally Identifiable InformationNewly discovered breaches at E*Trade Financial and Dow Jones highlight hackers' increasing attempts to steal, sell and utilize personal information. Security experts describe PII's value for fraudsters and scammers and offer lessons learned from these and other incidents.
As organizations' data centers become more dynamic and the need to scale quickly in complex architectures grows, security will need to adapt accordingly. Read this survey results paper to learn the challenges hybrid data centers face, along with some of the steps you can take to update current practices to enhance security for the dynamic data centers in use today.
Adobe on Tuesday released security updates for Flash Player, AIR, Acrobat and Reader that address numerous bugs, some of which are considered critical.
Putrid Piper picked apart a packet for just $15
KU Leuven Phd student Mathy Vanhoef has smashed conventional wireless security thought by creating continual, targeted and virtually indefensible stealth jamming of WiFi, Bluetooth, and Zigbee networks, and tampering with encrypted traffic, with little more than a $15 dongle.
3 minutes ago New zero-day exploit hits fully patched Adobe FlashArsTechnica View Synopsis+1
Attacks used to hijack end users' computers when they visit booby-trapped sites.
3 minutes ago UK hacker Lauri Love fights extradition to USSC Magazine View Synopsis+1
UK graduate student Lauri Love is using a new tactic in his attempt to fight extradition to the U.S.
21 minutes ago Cops Knock Down Dridex Malware That Earned Eastern European Crooks At Least $50 MillionForbes View Synopsis+1
The Dridex botnet, one of the most significant cybercriminal operations seen in recent years, has been dealt a severe blow, with one arrest and a takedown of the malware infrastructure.
America's Thrift Stores reported a breach that compromised credit card information for an unknown number of its customers who shopped at the 18-store chain in September 2015.
LAS VEGAS (AP) - Hillary Rodham Clinton entered Tuesday night's first Democratic debate a weakened front-runner, anxious to move past the controversy over her email practices and persuade voters she's the best-qualified candidate to lead the party to a third straight term in the White House.
2 hours ago Five Tools For Online Privacy And SecurityForbes View Synopsis+1
These tools will help you block ads, thwart sneaky third party trackers, and more.
The subscription-based service includes a Web portal where Visa clients can share and view cyber intelligence, forensic threat analysis from recent data breaches, and information on malicious software.
The US Department of Energy (DoE) will spend more than US $34 million to establish two research projects that will focus on protecting the country's power grid from cyberthreats.......
E-Trade has notified approximately 31,000 customers that their personal information may have been compromised in a 2013 breach.......
Dow Jones says that its systems were breached and that some personal information was exposed.......
Customer relationship management (CRM) is growing faster than any form of enterprise software, according to Gartner Research. CRM tools have a predicted annual growth rate of 15.1 percent until 2017.
2 hours ago Best Fitness Apps for AndroidIT Toolbox Blogs View Synopsis+1
This post looks at a few of the best fitness apps for Android
2 hours ago Four Changes in Enterprise Security After BYODIT Toolbox Blogs View Synopsis+1
Talk with 100 different CIOs, and you'll get 100 different answers for how they view bring-your-own-device (BYOD) and where their business falls on the readiness continuum.
Regardless of where the business stands, however, one thing is for certain: BYOD is already happening within the organization, like it or not.
"IT teams need to approach
3 hours ago Mapping An Adversary's Digital FootprintForbes View Synopsis+1
In the early 20th Century Dr. Edmond Locard famously observed "every contact leaves a trace," and that principle in forensics is no less true today in computer forensics. Everything we do online leaves a trail of IP addresses, of services used, of log files created. And whenever there is an [...]
Even Windows 10 wasn't left out of the trifecta of monthly security patches.
3 hours ago Angler exploit kit targets up to 156 million UK Daily Mail readers in malvertising spreeZDNet View Synopsis+1
The infamous Angler exploit kit has been striking up to 156 million Daily Mail readers a month.
4 hours ago MS15-107 - Important: Cumulative Security Update for Microsoft Edge (3096448) - Version: 1.0Microsoft View Synopsis+1
4 hours ago MS15-108 - Critical: Security Update for JScript and VBScript to Address Remote Code Execution (3089659) - Version: 1.0Microsoft View Synopsis+1
4 hours ago MS15-109 - Critical: Security Update for Windows Shell to Address Remote Code Execution (3096443) - Version: 1.0Microsoft View Synopsis+1
Updates released on Tuesday by Adobe for Flash Player, Reader and Acrobat address a significant number of vulnerabilities that expose the users of these products to hacker attacks.
Making the terrorists' job easier? "˜Yes', say the cops
Messaging app LINE has introduced end-to-end encryption, with secure chat messaging available on all version of the software, including the desktop version, and turned on by default on Android.
WASHINGTON (AP) - The private email server running in Hillary Rodham Clinton's home basement when she was secretary of state was connected to the Internet in ways that made it more vulnerable to hackers while using software that could have been exploited, according to data and documents reviewed by The Associated Press.
6 hours ago Is data loss prevention better than cure?The Register View Synopsis+1
Join our experts on November 12 and find out
Regcast A quick glance at the mainstream press, never mind the pages of The Reg, will show why data loss and theft are very bad news for your company and your career.
6 hours ago Securing Digital India from FraudInfoRiskToday View Synopsis+1
Experts: You Need Boards Buy-in to Create Cybersecurity Eco-SystemIndian enterprises must strengthen their capabilities to secure Digital India. To combat emerging threats, security leaders prescribe a self-regulatory approach, rather than one driven by compliance mandates.
A report published on Tuesday by Trend Micro provides a detailed view of Japan's cybercriminal underground which, despite being in its infancy, has all the elements needed to thrive.
Visa and FireEye today launched Visa Threat Intelligence, a new offering powered by FireEye that delivers real-time threat information to merchants and payment card issuers.