In a Q&A with ZDNet, the vice president of Cybersecurity Services at Fidelis explains why top-level management has to be the security-focused example for others to follow.
It's designed to use a radio connection to add a physical layer of obfuscation to an internet user's location.
The post This Online Anonymity Box Puts You a Mile Away From Your IP Address appeared first on WIRED.
Long-standing problems and a history of high-profile bugs in OpenSSL such as Heartbleed have prompted Amazon to write a replacement minimalist TLS implementation.
WASHINGTON (AP) - Senior Obama administration officials, including the White House chief of staff, knew as early as 2009 that Hillary Rodham Clinton was using a private email address for her government correspondence, according to some 3,000 pages of correspondence released by the State Department late Tuesday night
Ransomware known as CryptoWall is being used in attacks that exploit a flaw in Adobe Flash Player for which Adobe issued a patch just last week.......
The 4th of July is approaching, a U.S. holiday celebrating independence from the British. But sometimes the first war doesn't solve all the problems. The War of 1812 is referred to as America's "Second War of Independence," fought to clarify a few things with the British Empire that remained from the American Revolutionary War.
9 hours ago Corrupt DEA Agent Pleads Guilty To Extorting Bitcoin From Silk Road Creator Ross UlbrichtForbes View Synopsis+1
A former DEA agent pleaded guilty Wednesday to money laundering, obstruction of justice and extortion for his actions during two years investigating the online drug marketplace Silk Road as an undercover agent.
7 hours ago IoT Devices and Persistent ThreatsIT Toolbox Blogs View Synopsis+1
As hardware and software for IoT devices improves and proliferates we?ll see which IoT security challenges prove most crucial, and how they are being met.
2 hours ago Meeting the Digital Identity ChallengeInfoRiskToday View Synopsis+1
Security Panel: Improving Authentication, Access, GovernanceIn an exclusive panel hosted by ISMG, security leaders discuss new strategies and solutions for securing the digital customer experience. Are CISOs game to tackle this evolving security challenge?
According to a statement, Trump Hotel Collection has been alerted to potential suspicious credit card activity and is determining if it involves any of its properties.
21 hours ago Office of Personnel Management Data HackSchneier blog View Synopsis+1
I don't have much to say about the recent hack of the US Office of Personnel Management, which has been attributed to China (and seems to be getting worse all the time). We know that government networks aren't any more secure than corporate networks, and might even be less secure.
I agree with Ben Wittes here (although not the imaginary double standard he talks about in the rest of the essay):For the record, I have no problem with the Chinese going after this kind of data. Espionage is a rough business and the Chinese owe as little to the privacy rights of our citizens as our intelligence services do to the employees of the Chinese government. It's our government's job to protect this material, knowing it could be used to compromise, threaten, or injure its peopleÂ -- not the job of the People's Liberation Army to forebear collection of material that may have real utility.
Former NSA Director Michael Hayden says much the same thing:If Hayden had had the ability to get the equivalent Chinese records when running CIA or NSA, he says, "I would not have thought twice. I would not have asked permission. I'd have launched the star fleet. And we'd have brought those suckers home at the speed of light." The episode, he says, "is not shame on China. This is shame on us for not protecting that kind of information." The episode is "a tremendously big deal, and my deepest emotion is embarrassment."
My question is this: Has anyone thought about the possibility of the attackers manipulating data in the database? What are the potential attacks that could stem from adding, deleting, and changing data? I don't think they can add a person with a security clearance, but I'd like someone who knows more than I do to understand that risks.
"Merkel's fear was that Athens would be unable to overcome its problems."
There are currently an estimated 4.9 billion embedded systems distributed worldwide. By 2020, that number is expected to have grown to 25 billion. Embedded systems can be found virtually everywhere, ranging from consumer products such as Smart TVs, Blu-ray players, fridges, thermostats, smart phones, and many more household devices. They are also ubiquitous in businesses where they are found in alarm systems, climate control systems, and most networking equipment such as routers, managed switches, IP cameras, multi-function printers, etc. Unfortunately, recent events have taught us these devices can also be vulnerable to malware and hackers. Therefore, it is highly likely that one of these devices may become a key source of evidence in an incident investigation. This paper introduces the reader to embedded systems technology. Using a Blu-ray player embedded system as an example; it demonstrates the process to connect to and then access data through the serial console to collect evidence from an embedded system non-volatile memory.
World+dog can TEE off too, without spending megabucks
A trio of Intel boffins have broken a vendor lock-down on trusted execution environments (TEEs) with the release of an open source framework that could help developers to build more secure apps.
11 hours ago Saboteurs leverage RIPv1 for DDoS reflection attacksSC Magazine View Synopsis+1
According to an Akamai threat advisory, attackers leveraged an outdated routing protocol RIPv1 for their malicious aims.
9 minutes ago Level 3 acquires DDoS mitigation firm Black LotusZDNet View Synopsis+1
The deal adds proxy-based DDoS mitigation services to Level 3's portfolio.
Trump Hotel Collection is working to determine if its payment systems have been breached by cybercriminals after several U.S. banks identified fraudulent activity on cards used at the company's hotel properties.
SingPass users will need to set up the two-factor authentication process in their account, linking either their mobile number or the country's national 2FA token, OneKey.
TOKYO (AP) - North Korea, already one of the least-wired places in the world, appears to be cracking down on the use of the Internet by even the small number of foreigners who can access it with relative freedom by blacklisting and blocking social media accounts or websites deemed to carry harmful content.
Looking at your phone may become the new way to pay, as MasterCard begins experimenting with biometric technology to allow users to pay with a touch of a finger or a by taking a selfie upon checkout.
The paradigm shift towards ecommerce has forced retail business owners with two options : either open up to ecommerce retailing or perish. But making the move is easier said than done
10 hours ago UK Gets Ironic by Spying on Amnesty InternationalWIRED View Synopsis+1
Pot, meet kettle. As Britain joins other Wassenaar nations in calling to prevent spying against human rights workers, it turns out it has been spying on Amnesty International.
The post UK Gets Ironic by Spying on Amnesty International appeared first on WIRED.
...digital business, big data and the Internet of Things play together very well indeed. To find out more, register for the webcast ?Becoming an Enterprise Digital business: A perspective from featured Gartner analyst Donald Feinberg,? scheduled for July 28, 2015, at 11:00 a.m. ET, to learn from thought leaders what all this means for you and your business.
11 hours ago FISC judge gives NSA go-ahead to resume surveillanceSC Magazine View Synopsis+1
A surveillance court judge ruled Monday that the NSA could temporarily resume its bulk data collection program during the transition period to the reforms of the USA Freedom Act signed into law June 2.