Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Don't panic, but your baby monitor can be hacked into a spycam

The Register View Synopsis+1
Researchers confirm hardware vulnerable to remote attacks

Security researchers say they can back up a mother's claim that her baby monitor had been remotely hacked and used to spy on her family.

1 day ago A hacker figured out how to brute force iPhone passcodes

ZDNet View Synopsis+1
The attack allows any would-be-hacker to run as many passcodes as they want, without destroying the data.

1 day ago Meet TLBleed: A crypto-key-leaking CPU attack that Intel reckons we shouldn't worry about

The Register View Synopsis+1
How to extract 256-bit signing keys with 99.8% success

Intel has, for now, no plans to specifically address a side-channel vulnerability in its processors that can be potentially exploited by malware to extract encryption keys and other sensitive info from applications.

2 days ago Amazon Employees Ask Bezos To Stop Selling Facial Recognition To Cops

Forbes View Synopsis+1
Amazon's CEO is called on to quit selling the Rekognition surveillance tool to American cops and to cease providing services for immigration enforcement.

2 days ago How Deception Technology Gives You The Upper Hand In Cybersecurity

Forbes View Synopsis+1
Deception offers an effective way to detect attacks in progress, with no false positives. It alters the balance of power between attacker and target, giving companies the upper hand in combating both external and internal threats.

Top News

11 hours ago Microsoft unexpectedly drops Windows 7 support for some ancient CPUs

ZDNet View Synopsis+1
Believe it or not, some hardy souls are still running Windows 7 on PCs equipped with turn-of-the-century Pentium III CPUs. But the latest round of Windows 7 security patches won't install on those devices. Here's the background.

10 hours ago Hardened Azure logins, softened containers, leaky encrypted images on Macs - and more

The Register View Synopsis+1
Plus: Crypto-cash and keeping up with McAfee

Roundup This week you had to deal with AI security panic, fake Fortnite, and, if you use OpenBSD, the end of Intel HyperThread support

1 day ago Scammers Attack Email Inboxes With A Ransomware Protection Racket

Forbes View Synopsis+1
Ransomware can be pretty scary stuff. So scary, in fact, that some cybercriminals are trying to terrorize people into paying up before they're even infected.

1 day ago How to create a respectful and profitable data privacy policy

TechRepublic View Synopsis+1
Blockchain expert Alex Feinberg explained how internet companies could use emerging technology to balance profit and privacy concerns.

1 day ago Preview: ISMG's Fraud and Breach Prevention Summit in Chicago

InfoRiskToday View Synopsis+1
Leading the latest edition of the ISMG Security Report: A preview of next week's Fraud and Breach Summit in Chicago, which will feature keynoter Brett Johnson, a former cybercriminal who now advises organizations on fighting crime.

1 day ago Hidden Tunnels: A Favored Tactic to Evade Strong Access Controls

SecurityWeek View Synopsis+1

Use of Hidden Tunnels to Exfiltrate Data Far More Widespread in Financial Services Than Any Other Industry Sector

Latest News

7 hours ago PayPal touts global reach as mobile wallets pop up in APAC

ZDNet View Synopsis+1
Banks, telcos, and e-commerce players in the region now offer their own payment platforms, but PayPal believes its global reach and security infrastructure will ensure its market relevance.

10 hours ago Apple pushes back on hacker's iPhone passcode bypass report

ZDNet View Synopsis+1
The researcher later found that passcodes he tested weren't always counted.