The Security Daily

Technology

Franchising Ransomware - McAfee

Shared by McAfee Labs

blogs.mcafee.com - Got a great business idea? Want to expand with less risk? Build a good product, develop some training, put them together into a repeatable formula, and collect the royalties from your franchisees. ...

Google yanks fake Android battery monitor

Shared by Kimberly

theregister.co.uk - Zscaler has spoiled someone's app-spoofing sting, discovering a fake battery monitor app on Google Play. Worryingly, the spoof app seems to have gotten past Google's self-lauded Bouncer app vetting...

XSSposed launches pay-whatever bug bounty

Shared by Kimberly

theregister.co.uk - Cross-site scripting war board XSSposed has opened a pay-whatever bug bounty to help its hackers earn cash and tee-shirts. Launched overnight, the program lets anyone register their interest in hea...

Pwned Hacking Team tells cops, govts to shut down software

Shared by Kimberly

theregister.co.uk - Flayed surveillance outfit Hacking Team is telling customers to suspend running instances of its software after 400GB of its source code and internal data was stolen and posted online. The Milan co...

Get ready. Mystery high severity bug in OpenSSL to be patched on Thursday

Shared by BrianHonan

grahamcluley.com - A new version of OpenSSL, the open-source software widely used to encrypt internet communications using SSL/TLS, is due to be released this Thursday 9th July, patching a single "high severity" vuln...

Massive rollouts, net neutrality death and more news of machines replacing humans

Shared by GFI Software

gfi.com - How does it feel to roll out a billion devices? Microsoft will soon find out, but it will be using a very conservative method to rollout Windows 10 with a rolling rollout that will first reach the ...

Sony's Cyber-shot RX100 IV and RX10 II to hit Australia and Asia this month - CNET

Shared by CNET

cnet.com - If you're hankering after the latest Sony camera, in particularly the new Cyber-shot RX100 IV and RX10 II, the good news that you'll be able to get it this month if you live in Australia or countri...

The best way to prevent data breaches? It's not what you think

net-security.org - The best way to prevent data breaches? It's not what you think Data security breaches seem to be popping up almost daily. From the 2015 IRS breach, to the hacking of federal government employees’ d...

Sheryl Sandberg joins board of SurveyMonkey, late husband's company - CNET

Shared by CNET

cnet.com - Sheryl Sandberg, Facebook's chief operating officer, has taken a seat on the board at SurveyMonkey, the online polling and survey company formerly run by David Goldberg, her late husband. Goldberg ...

A number of vulnerabilities affect IP Enabled AirLive Cameras

securityaffairs.co - A number of IP-enabled AirLive cameras manufactured by OvisLink Corp are affected by command injection vulnerabilities that could be exploited by attackers to decode user credentials and completely...

Black Hat

blackhat.com - Q: What trends is Talos seeing in terms of threats this year? What should be the top concern of major organizations? Craig Williams: We are clearly seeing an escalation around organized criminal ac...

Samsung expects seventh straight profit decline in second quarter - CNET

Shared by CNET

cnet.com - Samsung Electronics said Monday expects its operating profit for the second quarter will miss analyst expectations as it continues to battle tough competition in the smartphone market. Samsung's op...

Twitter now allows users to add birthdays to their profiles - CNET

Shared by CNET

cnet.com - Psst, Twitter wants to know your birthday -- but will you let them? The social networking service said Monday with the new feature, users are now able to share and celebrate their birth date along ...

Amazon Kindle Paperwhite 2015 review: The Goldilocks e-reader?

Shared by CNET

cnet.com - If you liked Amazon's last Paperwhite e-reader, you'll like the 2015 version a little more. That's because the new third-generation model adopts the same high-resolution e-ink display of the top-of...

Hacker High: Why We Need to Teach Hacking in Schools

Shared by Kimberly

tripwire.com - We’re in the midst of a national cybersecurity crisis. Breaches, such as the ongoing OPM breach, are continuing at an alarming rate. Organizations are building their security infrastructure, but ar...

Old MS Office feature can be exploited to deliver, execute malware

net-security.org - Old MS Office feature can be exploited to deliver, execute malware A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable file...

MSPs: How Are You Safeguarding Your Clients’ Data?

Shared by Symantec

mspmentor.net - In case you haven’t noticed, no one has been immune to data breaches. Some of the largest enterprises in the world have been hit over the past two years, leaving little doubt that any company is no...

MERS News Used in Targeted Attack against Japanese Media Company

Shared by TrendLabs

blog.trendmicro.com - Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from...

Ryan Gallagher | RJGallagher.co.uk: Hacking Team: Mass Surveillance Made In Milan

notes.rjgallagher.co.uk - Hacking Team: Mass Surveillance Made In Milan Monday, 27 August 2012 Of all the companies I have encountered while working on stories about surveillance technology used by police and governments, I...

The Top Five Cyber Security Vulnerabilities - InfoSec Institute

Shared by Symantec

resources.infosecinstitute.com - In the last weeks, the hack of the Federal Office of Personnel Management (OPM), apparently tied to Chinese sponsored hackers, raised the discussion about the potential catastrophic damage caused b...

Hacking Team havoc shows even 'security experts' suck at security

theregister.co.uk - Analysis Over the weekend, 400GB of highly sensitive files belonging to Italian malware spyware software house Hacking Team were spread over the internet for everyone to see. The leaked source code...

Google Pulls ClickFraud App from Google Play

Shared by BrianHonan

threatpost.com - A malicious Android app spoofing the popular BatteryBot Pro app has been pulled from Google Play. Researchers at Zscaler reported the app, which had a package name of com.polaris.BatteryIndicatorPr...

45% of ex-employees continue to have access to confidential corporate data - MediaCenter Panda Security

pandasecurity.com - With the current situation experienced by the labor market, it is essential for companies to take steps in order to maintain their security in face of the movements which may occur in their workfor...

Fake BatteryBot Pro App Serves Malware, Can't Be Deleted

Shared by Eric Mathieu

infosecurity-magazine.com - A new form of mobile malware designed with multiple malicious intentions has appeared, in the form of a spoofed app that is a copy of legitimate app BatteryBot Pro. The fake app will provide the sa...

Insider Threats Defined

Shared by alienvault

alienvault.com - According to the second annual SANS survey on the security of the financial services sector, the number one threat companies are concerned about doesn’t relate to nation-states, organised criminal ...

Fujitsu delivers Chromebooks to ANZ enterprises

Shared by ITBrief

itbrief.co.nz - Teaming up with Google, Fujitsu is delivering an enterprise-grade managed service offering that leverages the Chrome platform to ANZ customers.  The Fujitsu Managed Chromebook Service enables custo...

Everybody loves (and hates) security

Shared by GFI Software

gfi.com - For real estate professionals, the common mantra is location, location, location. For IT professionals, it’s security, security, security. Computer users, ranging from barely-computer-literate gran...

GSec Paper Voting

Shared by HITBSecConf

gsec.hitb.org - User: Pass: Don't have an account? Register! Title Author(s) Votes Root Hundreds of Thousands of Android Devices with One Generic Exploit Wen Xu (KEEN Team) 4 Deep Analysis and Case Study of Target...

NEOHAPSIS - Peace of Mind Through Integrity and Insight

Shared by Jaime Blasco

archives.neohapsis.com - Bugtraq archives for 4th quarter (Oct-Dec) 1994: Re: Internet worm source code Re: Internet worm source code David Vincenzetti (vincedsi.unimi.it) Sat, 15 Oct 1994 12:21:34 +0100 (MET) Messages sor...

Is OPM Breach Just Tip of Iceberg?

bankinfosecurity.com - As federal lawmakers return this week from their Independence Day recess, Congress picks up where it left off before the break: holding hearings on the Office of Personnel Management breach that ex...

OpenSSL Preparing Updates to Patch High Severity Vulnerability

securityweek.com - OpenSSL versions 1.0.2d and 1.0.1p will be released later this week to address a serious security bug, the OpenSSL Project Team announced on Monday. According to the developers of the popular open-...

Cisco Unified CDM platform open to cyber attacks

securityaffairs.co - A default privileged account with a static password that cannot be changed affect the  Cisco Unified Communications Domain Manager (Cisco Unified CDM) opening the platform for remote attacks. The C...

Hacking Team Asks Customers to Stop Using Its Software After Hack

motherboard.vice.com - After suffering a massive hack, the controversial surveillance tech company Hacking Team is scrambling to limit the damage as well as trying to figure out exactly how the attackers hacked their sys...

60 Epic Resources for Starting and Growing your Ecommerce Business

Shared by Moblized

moblized.com - On the surface, starting and building a successful ecommerce business may look easy: Find a product to sell, buy a WordPress template, select an ecommerce plug-in, and watch the money start rolling...

Search vs. Discovery and Brand Experience - The Lumiary Blog

Shared by Moblized

blog.lumiary.com - Think about how “search” has gone from a common descriptive verb to one of the most powerful business concepts in history.  As Jeff Bezos likes to say, every company ultimately gets disrupted and G...

Giorgetto Giugiaro Quits Italdesign Giugiaro After 47 Years

Shared by Wes Miller

automobilemag.com - Almost a half-century after founding one of the most well-known and accomplished automotive design studios in the world, Giorgetto Giugiaro is walking away from Italdesign Giugiaro. Resigning from ...

Don't Kill Your Sales! Top 3 Shopping Cart Turnoffs

Shared by Moblized

marketingprofs.com - You've spent time and money designing the perfect marketing campaign. You've designed a flawless strategy to drive customers to your awesome sales page and you know it will convert. You've thought ...

After the split, HP Enterprise will be forbidden from selling itself

Shared by Wes Miller

businessinsider.com - Here's another interesting tidbit buried in a 316-page report filed to the SEC about HP's plans to separate itself into two companies. The new HP Enterprise company won't be able to sell itself for...

Awoogah: Get ready to patch 'severe' bug in OpenSSL this Thursday

theregister.co.uk - Sysadmins and anyone else with systems running OpenSSL code: a new version of the open-source crypto library will be released this week to "fix a single security defect classified as 'high' severit...

Hacker Claims Responsibility for the Hit on Hacking Team

motherboard.vice.com - An online anti-surveillance crusader is back with a bang. Last year, a hacker who only went by the name "PhineasFisher" hacked the controversial surveillance tech company Gamma International, a Bri...

Static Password Vulnerability Patched in Cisco Unified CDM

tripwire.com - Cisco has released a patch for a password vulnerability that was recently discovered in its Unified Communications Domain Manager (Unified CDM) Platform Software. According to a security advisory r...

Improving Your Security Awareness Campaigns With Behavioral Science

securityintelligence.com - InfoSec, Risk, and Privacy Strategist - Minnesota State University, Mankato Chris Veltsos is an associate professor in the Department of Computer Information Science at Minnesota State University, ...

From Pacemakers to Driverless Cars, the Absurdity of Banning Reverse Engineering

motherboard.vice.com - It's an uncomfortable thought: The pacemaker in your chest—or that might someday be in your chest—providing the electrical signals necessary for your heart to pump blood and keep you from sudden de...

Cryptowall 3.0 attacking Australian businesses: Alert Priority High

Shared by Philip Hall

communications.gov.au - A new variant of the ransomware known as Cryptowall is believed to be attacking Australian businesses. Attacks using Cryptowall 3.0 encrypt your files, and the malicious individuals behind the malw...

The Top 3 Ways to Get More Contacts with Heyo | The ONTRAPORT Blog

Shared by Moblized

blog.ontraport.com - We’re excited to announce our newest integration with Facebook campaign builder, Heyo! Now users can create highly engaging social campaigns in Heyo that pump leads into ONTRAPORT marketing and sal...

Which is the Best VPN Protocol? PPTP vs. OpenVPN vs. L2TP/IPsec vs. SSTP

howtogeek.com - Want to use a VPN? If you’re looking for a VPN provider or setting up your own VPN, you’ll need to choose a protocol. Some VPN providers may even provider you with a choice of protocols. This isn’t...

Trump Hotels investigates credit card hack

tripwire.com - Donald Trump doesn’t appear to be having the best of times. Not only has the business tycoon and (now) Republican presidential candidate been dumped by Macy’s, Univision and NBC over his comments o...

Apple has been testing a giant iPad for at least 3 years

Shared by Philip Hall

businessinsider.com - For months, reports have said Apple is preparing to release a larger iPad this year, perhaps called the iPad Pro. While Apple has yet to confirm any plans regarding its future products, Business In...

How Product Reviews Generate Most Valuable Traffic [Infographic]

Shared by Moblized

moblized.com - Your eCommerce business is growing. You have an exceptional storefront and site experience and are promoting high-quality products and services but you still aren’t seeing the amount of conversions...

The Road Ahead: Toyota Tops Tesla, Boasting 312-Mile Range For Mirai

Shared by Wes Miller

forbes.com - Toyota’s statement last week that its Mirai hydrogen fuel cell vehicle will get 312 miles between fill-ups is a shot across Tesla Motors Tesla Motors bow. Toyota’s Jim Lentz announced on Tuesday at...

This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →