Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago I was authorized to trash my employer's network, sysadmin tells court

The Register View Synopsis+1
Michael Thomas' appeal will send shockwaves through IT industry if successful

Back in December 2011, Michael Thomas did what many sysadmins secretly dream of doing: he trashed his employer's network and left a note saying he quit.

1 day ago Cloudbleed: Big web brands leaked crypto keys, personal secrets thanks to Cloudflare bug

The Register View Synopsis+1
Heartbleed-style classic buffer overrun blunder strikes in 2017

Big-name websites leaked people's private encryption keys and personal information into strangers' browsers, due to a Cloudflare bug uncovered by Google security researchers.

1 day ago Apple deleted server supplier after finding infected firmware in Siri servers

ArsTechnica View Synopsis+1
Report: Siri, internal development servers affected by fake firmware patch.

1 day ago How San Diego is building resilient networks and infrastructure to reduce threat of cyber crime

TechRepublic View Synopsis+1
Gary Hayslip, deputy director of IT and CISO for the city of San Diego, says no city can ever be 100% safe from cyber crime. Here's how San Diego is building multiple layers of overlapping security to protect its data networks to minimize risk.

1 day ago Serious Cloudflare bug exposed a potpourri of secret customer data

ArsTechnica View Synopsis+1
Service used by 5.5 million websites may have leaked passwords and authentication tokens.

Top News

19 hours ago NSA snoops told: Get your checkbooks and pens ready for a cyber-weapon shopping spree

The Register View Synopsis+1
US Cyber Command boss lays out plans for next decade

NSA and US Cyber Command boss Mike Rogers has revealed the future direction of his two agencies - and for the private sector, this masterplan can be summarized in one word.

5 hours ago When does security hamper productivity

IT Toolbox Blogs View Synopsis+1
We all should consider IT security in our daily activities. ... However like everything else there is a line where too much of a good thing becomes bad.

3 hours ago Targeted Malware Campaign Uses HWP Documents

SecurityWeek View Synopsis+1

A recently observed targeted malware campaign against South Korean users was using Hangul Word Processor (HWP) documents as the infection vector, Talos researchers reveal.

2 hours ago How To Avoid The 4 Nastiest Tax Scams

Forbes View Synopsis+1
Thieves are waiting to steal your tax and financial information. Here's how you can thwart them.

1 day ago Moving Away from Check-Box Compliance

InfoRiskToday View Synopsis+1
Leading the latest version of the ISMG Security Report: a look at how various sectors are moving away from check-box compliance to taking proactive measures to secure their information assets. Also, big increase in e-commerce fraud and Yahoo's costly breach.

1 day ago Google breaks SHA-1 web crypto for good but Torvalds plays down impact on Git

ZDNet View Synopsis+1
Researchers' SHA-1 collision spells the end of the cryptographic hashing algorithm for the web, but Linux kernel creator Linus Torvalds says not to worry about Git's reliance on SHA-1.

1 day ago Tor Browser Artifacts in Windows 10

SANS Reading Room View Synopsis+1
The Tor network is a popular, encrypted, worldwide, anonymizing virtual network in existence since 2002 and is used by all facets of society such as privacy advocates, journalists, governments, and criminals. This paper will provide a forensic analysis of the Tor Browser version 5 client on a Windows 10 host for an individual or group interested in remnants left by the software. This paper will utilize various free and commercial tools to provide a detailed analysis of filesystem artifacts as well as a comparison between pre- and post- connection to the Tor network using memory analysis.

Latest News

10 hours ago UK cops can keep millions of mugshots of innocent folks on file

The Register View Synopsis+1
You can ask to be removed, but it's up to officers to listen, Home Office cheerfully concludes

After unlawfully hoarding millions of mugshots of one-time suspects, UK police chiefs were this week told to delete the snaps - but only if the people in the photos complain. And even then, requests can be easily waved away.