Threat Level: green Handler on Duty: Richard Porter

SANS ISC Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Judge throws antivirus patents back to Hell

The Register View Synopsis+1
Loss of two patents cripples case with Trend Micro, could slash Symantec payout

A US district court has torn the heart out of two patents wielded by Intellectual Ventures against two antivirus makers.

2 days ago Pro tip: Three ways to gain (or prevent) admin access to OS X

TechRepublic View Synopsis+1
Jesus Vigo goes over three ways to recover admin access (or prevent unauthorized access) to OS X-based devices.

2 days ago The DHS brings its infantile, cyber-fantasy world to RSA 2015

ZDNet View Synopsis+1
OPINION: In his RSA 2015 keynote on national cybersecurity threats, Homeland Security head Jeh Johnson told an audience of cybsersecurity experts something so wildly impossible, it almost went unnoticed.

2 days ago RSA 2015: Keynote addresses online safety risks to increasingly connected youths

SC Magazine View Synopsis+1
Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.

2 days ago Op-Ed: In defense of Tor routers

ArsTechnica View Synopsis+1
One InvizBox creator responds to assertion that Tor routers are "ridiculous."

Top News

10 hours ago App makers, you're STILL doing security wrong

The Register View Synopsis+1
Microsoftie Troy Hunt unpicks privacy invasion and unencrypted passwords

Security expert Troy Hunt has taken a look at what mobile apps collect to send home to their owners, and isn't impressed: even PayPal is still addicted to invasive habits, he says.

6 hours ago "‹Russian hackers read Obama emails: Report

ZDNet View Synopsis+1
Last year's breach of the White House's unclassified computer system reportedly saw Russian hackers get access to US President Barack Obama's emails.

5 hours ago Mom's #1 Rule for Success

IT Toolbox Blogs View Synopsis+1
"There is only one success - to be able to spend your life in your own way." -Christopher Morley

 

Out

4 hours ago Hawaii telescope website taken down in apparent cyberattack

Yahoo Security View Synopsis+1
HONOLULU (AP) - An apparent cyberattack Sunday temporarily disrupted the main website of Thirty Meter Telescope, the organization trying to construct one of the world's largest telescopes near the summit of Mauna Kea on Hawaii's Big Island.

59 minutes ago WordPress Under Attack As Double Zero-Day Trouble Lands

Forbes View Synopsis+1
WordPress zero-days are being used to hack into sites across the web and attacks aren't likely to slow thanks to exploit code being made publicly available. Most versions of the platform, used by 20 per cent of the web, are affected.

1 day ago Russian Hackers Read Obama Emails: Report

SecurityWeek View Synopsis+1

Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, The New York Times said Saturday.

16 hours ago Report: Unclassified e-mails from Obama to staff read by Russian hackers

ArsTechnica View Synopsis+1
Hackers didn't breach classified servers, but the close call chilled staffers.

Latest News

17 minutes ago Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones

Forbes View Synopsis+1
Hackers who want real stealth might want to hack their own body first. An ex-military security specialist tells FORBES an NFC chip in his hand would be a useful tool in any digital criminal's arsenal, showing off an exploit attacking an Android phone. Is evil biohacking about to go mainstream?

44 minutes ago Thousands of iOS apps left open to snooping thanks to SSL bug

ZDNet View Synopsis+1
iOS developers are being urged to update their apps to use the latest version of a library that fixes a security flaw that leaves their apps exposed to man-in-the-middle attacks.

1 hour ago NINETY PER CENT of Java blackhats migrate to footling Flash

The Register View Synopsis+1
Patch-or-die policy makes net scum move on to softer target

RSA 2015 Almost every Java-hacking blackhat is now popping Adobe Flash, after Microsoft's hard-line patch policy made it harder to target techs such as Java.

3 hours ago US hospitals to treat medical device malware with AC power probes

The Register View Synopsis+1
'WattsUpDoc' is a stethoscope that detects viruses in sealed-box medicomputers

Two large US hospitals will in the next few months begin using a system that can detect malware infections on medical equipment by monitoring AC power consumption.

3 hours ago Google says Chinese Great Cannon shows need to encrypt web

ZDNet View Synopsis+1
The large DDoS attack on GitHub and Greatfire that occurred over March and April would not have been possible with encrypted web traffic, Google has said.

4 hours ago Addition by Subtraction

IT Toolbox Blogs View Synopsis+1

I've heard this expression before.  It's cool when I hear it, but the reality is pretty elusive.  It means that by taking something away, what's left is better than before the removal.

 

Great sculptors seem to work this way.  "I see the figure in the block of stone, and just remove the excess until it's all that's left."  The end is better than the

6 hours ago NINETY PERCENT of Java blackhats migrate to footling Flash

The Register View Synopsis+1
Patch-or-die policy makes net scum move on to softer target

RSA 2015 Almost every Java-hacking blackhat is now popping Adobe Flash after Microsoft's hard line patch policy made it harder to target techs such as Java.

11 hours ago The mere idea of regaining privacy sends law enforcement into a tizzy

ZDNet View Synopsis+1
The prospect of losing a smidgen of the data hoovered up by law enforcement has worried one police chief enough to effectively 'terror Godwin' the entire conversation, which shows that good is happening with privacy, for a change.