Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Yet another way for criminals to screw us

IT Toolbox Blogs View Synopsis+1
Fraudsters Tap Kohl?s Cash for Cold Cash

2 days ago NYPD Used Stingrays over 1,000 Times Since 2008

SecurityWeek View Synopsis+1

Documents obtained by the New York Civil Liberties Union (NYCLU) this month show that the New York Police Department used stingrays more than 1,000 times since 2008 without warrants.

2 days ago When it comes to spaffing your login creds, Android biz apps are the business

The Register View Synopsis+1
300% better at it than non-business apps

Business apps for Android are three times more likely to leak login credentials than the average app, according to a new study by security firm NowSecure.

2 days ago BlackEnergy, KillDisk Infect Ukrainian Mining, Railway Systems

SecurityWeek View Synopsis+1

Researchers at security firm Trend Micro have found evidence suggesting that pieces of malware involved in the recent attacks against Ukraine's energy sector have been used to target other types of organizations as well.

1 day ago Skype users were targeted by bad-ad pushing Angler crooks

The Register View Synopsis+1
But fear not - the taint has now been purged

Cybercrooks have been caught running booby-trapped ads on Skype to redirect users towards an Angler exploit kit trap.

Top News

10 hours ago Checklist for Assessing a Disaster

IT Toolbox Blogs View Synopsis+1
The Business Continuity Plan needs to outline the steps and issues that ought to be considered when assessing the impact of a disaster. The Recovery Coordinator must be able to advise the Chief Executive and senior management teams on the impact of a...

1 day ago How to use secure shell from your Chromebook

TechRepublic View Synopsis+1
If you remotely administer Linux servers with the help of secure shell, grab the nearest Chromebook. Jack Wallen walks you through the steps of using ssh from Chrome OS.

1 day ago Reports Of A Cybersecurity Market Slowdown Have Been Greatly Exaggerated

Forbes View Synopsis+1
Is cybersecurity still a hot market, or is it starting to cool down?

20 hours ago Teen Arrested in Britain Linked to Hack of US Spy Chiefs

SecurityWeek View Synopsis+1

British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials.

1 day ago Ukraine sees Russian hand in cyber attacks on power grid

Yahoo Security View Synopsis+1
By Pavel Polityuk KIEV (Reuters) - Hackers used a Russian-based internet provider and made phone calls from inside Russia as part of a coordinated cyber attack on Ukraine's power grid in December, Ukraine's energy ministry said on Friday. The incident was widely seen as the first known power outage caused by a cyber attack, and has prompted fears both within Ukraine and outside that other critical infrastructure could be vulnerable. The ministry, saying it had completed an investigation into the incident, did not accuse the Russian government directly of involvement in the attack, which knocked out electricity supplies to tens of thousands of customers in central and western Ukraine and prompted Kiev to review its cyber defenses.

1 day ago Yes, your smart toaster really will be spying on you for the government

ZDNet View Synopsis+1
US intelligence chief says the Internet of Things will create new opportunities for surveillance and hacking.

1 day ago Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking

WIRED View Synopsis+1

Researchers have uncovered ties between the attack against Sony in late 2014 and more recent hacks, suggesting the culprits are still active.

The post Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking appeared first on WIRED.

1 day ago Unlocking Software Innovation with Secure Data as a Service

InfoRiskToday View Synopsis+1

Mobile banking applications have become the front line for acquiring and retaining customers in the midst of competitive pressures. On the back end, IT organizations are constantly looking to modernize, rationalize, and consolidate their application portfolios to reduce costs and improve efficiencies. Private and public cloud onboarding has become a strategic, cost-effective initiative for many large banks, but securely migrating applications containing sensitive customer data is cost prohibitive. Aside from these impediments, financial institutions face heightened regulatory pressures and must invest in costly compliance programs. On the whole, these competing requirements compound the demands for data, making Data as a Service an integral component of any enterprise data management strategy.

In this webinar we will discuss:

  • Current market trends and the importance of software innovation in the financial services industry;
  • Technology debt and other impediments to developing applications that are critical to customer experience and competitive advantage;
  • The advantages of using an integrated data masking and delivery solution to solve critical bottlenecks in the software development lifecycle;
  • Case studies of financial services institutions that are using Data as a Service to accelerate application releases and unlock innovation.

1 day ago Fitbit Data Reveals Pregnancy

Schneier blog View Synopsis+1

A man learned his wife was pregnant from her Fitbit data.

The details of the story are weird. The man posted the data to Reddit and asked for analysis help. But the point is that the data can reveal pregnancy, and this might not be something a person wants to tell a company who can sell that information for profit.

And remember, retailers want to know if one of their customers is pregnant.

1 day ago Warning: Bug in Adobe Creative Cloud deletes Mac user data without warning

ArsTechnica View Synopsis+1
Adobe has stopped distribution of an update believed to be triggering the deletions.

Latest News

2 hours ago Third-party mainframe maintenance services

IT Toolbox Blogs View Synopsis+1
Colin Fettes from Azamour Solutions took a look at alternative ways to source and support your mainframe infrastructure and examines its impact on your bottom line in this year?s Arcati Mainframe Yearbook.

5 hours ago "Two Speed and Bimodal IT", what's new or different?

IT Toolbox Blogs View Synopsis+1
According to definitions though, Two Speed IT and Bimodal IT appear to be the same concept for all intent and purpose.

8 hours ago 5 Aspects of the Marketing Cloud that Need Foolproofing

IT Toolbox Blogs View Synopsis+1
The marketing cloud is used for online advertising and other solutions, but it?s not perfect. Here are five cloud aspects that need foolproofing.