The Security Daily

Technology

15-year-old security hole HTTPoxy returns to menace websites – it has a name, logo too

theregister.co.uk - A dangerous easy-to-exploit vulnerability discovered 15 years ago has reared its head again, leaving server-side website software potentially open to hijackers. The Apache Software Foundation, Red ...

Feds Never Charged the Real Hacker in the Matthew Keys Case

wired.com - Former Reuters social media editor Matthew Keys is facing up to 25 years in prison after his conviction last month on conspiracy charges related to a 2010 hack of the Los Angeles Times web site. Al...

10 Critical Cloud Migration Planning Factors

Shared by Evident.io

learn.cloudvelox.com - Cloud computing is synonymous with IT disruption.  How users consume products and services is changing how businesses operate (see CNBC Top 50 Disruptors of 2016). How Enterprise IT supports the bu...

For Entrepreneurs Looking to Disrupt the Internet of Things Industry, Here is How to Ensure Customers Feel Safe Using Your Products

Shared by Alex Horovitz

entrepreneur.com - Q: For entrepreneurs going into the Internet of Things, what do they need to worry about? How do they keep their product safe? A: One of the biggest security challenges we will face over the next f...

Yes, Your Voice-Activated IoT Devices Are Always Listening

safeandsavvy.f-secure.com - We used to search holiday magazines to find the hotel that offered the biggest pool and then triple check that the hotel has air conditioning. If we were really picky, we wouldn’t look twice at a h...

Cisco Launches Cloud-Based Security Portfolio - Cloud Computing on Top Tech News

Shared by Alex Horovitz

toptechnews.com - The goal of the new products is to simplify and reduce the total number of different tools needed to fully protect an enterprise from the broad array of threats that now exist to network security, ...

Another email Hack: Should We Worry?

Shared by Scuttlebutt

poweradmin.com - Each time a major email service or social media platform gets hacked, the incident generates exciting headlines in the media. But behind the hype there’s a very real tale of anxiety for all the use...

Cyber Security Domain Names For Sale

ddostoday.com - Botnets Explained CLICK HERE FOR DOMAIN NAME BOTNET-VIDEOS.COM AVAILABLE FROM FLIPPA Automobile Hacking Prevention CLICK HERE FOR DOMAIN NAME CARHACKING-VIDEOS.COM AVAILABLE FROM FLIPPA BYOD Securi...

Hackers are targeting the Rio Olympics, so watch out for these cyberthreats

Shared by Evident.io

csoonline.com - The Olympic Games in Rio de Janeiro will attract more than just athletes and tourists this year. Hackers from across the world will also be on the prowl, trying to exploit the international event. ...

Many enterprise apps affected by flaws in Oracle OIT libraries

securityaffairs.co - The last critical Patch Update released by Oracle this week is in the headlines for the number of patches it includes. It includes the fixes for 276 vulnerabilities, 19 of them that have been rated...

Hackers Selling FUD Stampado Ransomware for Just $39

Shared by Alex Horovitz

hackread.com - The Dark Net is full of illegal products including drugs, fake id card, weapons, databases or even highly contemptible listings of child abuse images but now researchers have discovered complete ra...

This webcam malware could blackmail you into leaking company secrets | ZDNet

zdnet.com - Attackers are using a new piece of malware to record employees' private moments, in order to manipulate staff into leaking company secrets. According to Gartner fraud analyst Avivah Litan, the malw...

GM’s CEO, Mary Barra, says the threat of cars being hacked will pose a risk to the entire car industry

technologyreview.com - Automobiles are starting to resemble robotic smartphones on wheels. Unfortunately, that could be a pretty juicy target for would-be hackers. So far there have been relatively few incidents of car h...

Tech giants silent on new Russian surveillance law

fedscoop.com - U.S.-based tech giants appear set to silently ignore new Russian laws requiring them to hand over encryption keys for internet communications to state security agencies, those tracking the issue te...

Snowden and Bunnies devised the Introspection Engine to avoid surveillance

securityaffairs.co - While the number of mobile devices is outclassing the number of desktop ones, the concern about the surveillance activities conducted by governments is growing as never before also thanks the Snowd...

Amazon Breached And Customer Data Exposed...Or Not? - FileHippo News

Shared by Alex Horovitz

news.filehippo.com - That’s the trouble with those pesky data breaches…are they true, or not? In the case of the recent alleged attack on Amazon’s servers, we’re still not sure. But that doesn’t stop the news from circ...

A new generation of connected toys raises some thorny privacy questions

technologyreview.com - Talking toys have come a long way since the original Furby. Now they’re connected to the Internet, use speech recognition, and are raising a host of new questions about the online privacy and secur...

How to stay ahead of cyber criminals in the data breach era

thenextweb.com - It’s no secret that cyber attackers are becoming increasingly sophisticated, stealthy, and motivated. As we’ve seen in high profile breaches at Target, JP Morgan and Home Depot, attackers can infil...

California Appellate Court Holds Police Video of Arrest Not Protected Under Pitchess | JD Supra

jdsupra.com - JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data ...

Cross-platform malware Adwind infects Mac

blog.malwarebytes.com - A colleague referred me to an article on a piece of cross-platform malware, called Adwind RAT (short for “remote access tool”), that was going undetected. This is often code for “this malware was w...

Android Nougat won't boot if your phone has malware

Shared by Ian Cook

androidauthority.com - In a bid to increase the security of the Android operating system, Google introduced a new check for malware as part of the boot process in all Android devices. Until Marshmallow, Android devices r...

Five Plead Guilty To Hacking Rival

infosecurity-magazine.com - Five employees at UK IT security reseller Quadsys have pled guilty to hacking a rival company’s servers. The group—owner Paul Streeter, managing director Paul Cox, director Alistair Barnard, accoun...

FCC Chair Wants Phone Companies to Offer Robocall Blocking Tech for Free • /r/technology

Shared by Sam Bowne

reddit.com - /r/technology is a place to share and discuss the latest developments, happenings and curiosities in the world of technology; a broad spectrum of conversation as to the innovations, aspirations, ap...

Autonomous Vehicles and Hacking

itbusinessedge.com - Cameron Camp, a researcher for global security provider ESET, suggests that autonomous vehicles are very vulnerable to hacking. These vehicles typically use a Controller Area Network (CAN), a simpl...

7 Best antivirus and Security apps for Android ~ Ads2020 Blog -Free Sales Marketing via Ads, SEO, Social Media

Shared by Alex Horovitz

ads2020.marketing - Discover the Best Antivirus and Security apps for your Android Phone Mobile security against viruses that damage your device on downloading apps or files is a huge matter of consideration. With ant...

Challenges That Virtual Casinos Face When Guaranteeing Funds Security

Shared by Alex Horovitz

tgdaily.com - One of the most important parts of running a virtual casino is guaranteeing that player funds are secured. This is what counts the most, just as in the brick and mortar casinos. People will never a...

'Pokemon Go,' Popular New AR Game, Can Load Malware

Shared by John Martin

securityintelligence.com - Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor... “Pokemon Go” ...

Study: One-in-three websites hosting pirated content infested with malware

Shared by Ian Cook

fedscoop.com - About 30 percent of the websites offering pirated versions of Hollywood movies, TV shows and computer games are deliberately infested with malware — making their illegally copied content a lure for...

12 steps to safer online banking

blog.malwarebytes.com - Gone are the days of balancing check books. The advent of online banking has made budget-keeping and bill-paying a convenient, if not automatic, transaction for adults managing their finances. Whic...

5 Ways Edward Snowden’s Hack-Proof iPhone Case Could Stop Lurkers

takepart.com - Put your phone in the refrigerator. Former National Security Agency contractor Edward Snowden gave his lawyers this advice while discussing his plans to flee Hong Kong in 2013. After leaking detail...

Top 10 Mistakes to Avoid in a Data Breach Situation - Propel Insurance Blog

propelinsurance.com - 1. Don’t act rashly. Collect all of the facts before you respond. Often, the full story ends up being very different from the earliest versions. Give the IT “first responders” enough time to do the...

2016-07-22 IT Security News Daily Summary | | IT Security News

itsecuritynews.info - Stampado Ransomware campaign decrypted before it Started Threat Recap: Week of July 18th Samsung: You won’t settle? Fine, we’ll do this the Huawei Vuln: libxml2 CVE-2015-8710 Out-of-bounds Memory A...

Hacker Tools, Techniques, Exploits and Incident Handling

Shared by SANS Pen Test

sans.org - To get the most value out of the course, students are required to bring their own laptop so that they can connect directly to the workshop network. It is the students' responsibility to make sure t...

When should push come to shove over cybersecurity?

csoonline.com - We live in an era where increasingly sophisticated cybercriminals are regularly on the prowl for network vulnerabilities. So how can business respond to their slick phishing emails and social engin...

Fun with the Windows Subsystem for Linux

Shared by Binni Shah

blogs.windows.com - At Build 2016, Microsoft introduced to the world the Windows Subsystem for Linux (Beta) [WSL], which enables developers to run native Ubuntu user-mode console binaries through the Bash shell in Win...

CVE-2015-1641 and CVE-2015-2545 Are Today's Most Popular Microsoft Word Exploits

Shared by Ian Cook

news.softpedia.com - Two newer vulnerabilities targeting the Microsoft Office suite have become very popular in recent months, as Office exploit kit makers have updated their code and added support for the newer CVE-20...

A popular mobile game's forum has been hacked

Shared by Norton

zdnet.com - A hacker has targeted the official forum for popular mobile game "Clash of Kings," making off with close to 1.6 million accounts. The hack was carried out on July 14 by a hacker, who wants to remai...

Docker Mumbai

Shared by Docker

meetup.com - Welcome to the 2nd edition of the DockerCon 16 recap and this time we explore technologies introduced in the keynote like Docker 1.12, Swarm Mode, Distributed Application Bundle, Docker Store etc  ...

Microsoft EOP exposes users to data breaches, whitepaper

scmagazine.com - Vircom researchers believe that Microsoft Exchange Online Protection (EOP) may be exposing users and their networks to both data breach and data loss risks due to the manner in which EOP manages th...

Managed Services with @Commvault | @CloudExpo #DataCenter #IoT #Storage

wireless.sys-con.com - "Being the one true cloud-agnostic and storage-agnostic software solution, more and more customers are coming to Commvault and saying ' What do you recommend? What's your best practice for implemen...

How To Do Capacity Planning

bitpipe.com - Managing capacity planning as-needed or in a “what if?” fashion is common practice for many organizations. However, this method is not efficient. Why accept the status quo when you could prepare in...

Security Gets Political With Hacks, Darknet Sales

darkreading.com - With the Republicans meeting in Cleveland this week, political news dominated the headlines. So it will surprise exactly no one that security news turned political as well. At a glance, there were ...

Canadian Man Behind Popular ‘Orcus RAT’ — Krebs on Security

krebsonsecurity.com - Far too many otherwise intelligent and talented software developers these days apparently think they can get away with writing, selling and supporting malicious software and then couching their com...

Snowden Designs a Device to Warn if Your iPhone’s Radios Are Snitching

wired.com - When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA’s secrets, he famously asked them put their phones in the fridge to block any radio signals that might be used to s...

GOP delegates suckered into connecting to insecure Wi-Fi hotspots

theregister.co.uk - A Wi-Fi hack experiment conducted at various locations at or near the Republican National Convention site in Cleveland, US, underlines how risky it can be to connect to public Wi-Fi without protect...

50+ Internet Security Blogs You Should Be Following [Updated] - Heimdal Security Blog

heimdalsecurity.com - How can we keep up to date with all the cyber security news? How are we able to discern between the real threats and the ones exacerbated by the media? Where do we find the best resources that help...

Mossberg: I just deleted half my iPhone apps. You should too.

Shared by GFI Software

recode.net - Welcome to Mossberg, a weekly commentary and reviews column on The Verge and Recode by veteran tech journalist Walt Mossberg, executive editor at The Verge and editor at large of Recode. Over the p...

Stampado Ransomware: A Lifetime License for a Low Price

tripwire.com - In today’s digital threat environment, the common computer criminal wants two things: money and safety. They want to get a high return on investment for their efforts, but they don’t want to get ca...

Stagefright-like Bug Affects Apple Devices, Warns Researcher

tripwire.com - Last year, the notorious “Stagefright” flaw in Google’s Android operating system affected millions of devices, allowing hackers to execute code simply by sending a malicious MMS message. Dubbed one...

Privacy and Humanity Elements for the IoT / IoE

tripwire.com - In the first and second part of this series, we introduced the risks of the IoT / IoE world and addressed the mandatory security design considerations around the C-I-A triplet; the concepts of “ope...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →