The Knol Infos Daily

News from my followers on Twitter about mostly from Education and Cyber-Security

#infosec

DDoS, IoT Top Cybersecurity Priorities for 45th President — Krebs on Security

krebsonsecurity.com - Addressing distributed denial-of-service (DDoS) attacks designed to knock Web services offline and security concerns introduced by the so-called “Internet of Things” (IoT) should be top cybersecuri...

Cybersecurity Readiness Confidence Declined In 2016

Shared by Cx2H

darkreading.com - The confidence of security practitioners in global cybersecurity readiness fell slightly in 2016, according to a new report out today by CyberEdge Group and Tenable. The 2017 Global Cybersecurity A...

IT Professionals' Confidence in Cyber-Security Falls, Survey Finds

eweek.com - IT Professionals' Confidence in Cyber-Security Falls, Survey Finds By Robert Lemos  |  Posted 2016-12-05 Print An "overwhelming cyber-threat environment" has caused cyber-security professionals to ...

Workers are biggest security risk, one in three CIOs say

todayonline.com - SINGAPORE — One in three chief information officers (CIOs) in Singapore believes that their employees pose their greatest security risk, a survey commissioned by Robert Half showed yesterday, signa...

Women in Information Security: Zoё Rose

Shared by NGenCode

tripwire.com - Women are eagerly needed in information security because we offer unique perspectives and there are so few of us. So far in this series, I interviewed Tiberius Hefflin, Tracy Maleef, Isly, Kat Swee...

Behavior analytics tools for cybersecurity move into enterprises

computerworld.com - Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers, according to security analysts. Behavior analytics in cybersec...

Croton-Harmon Programming Students Share Cyber Safety Tips

patch.com - From Croton Harmon Schools: Carrie E. Tompkins Elementary School fourth-graders in Croton-on- Hudson were surprised to see the estimated time it would take a computer to crack their online password...

Google Debuts Continuous Fuzzer for Open Source Software

threatpost.com - A new Google program aimed at continuously fuzzing open source software has already detected over 150 bugs. The program, OSS-Fuzz, currently in beta mode, is designed to help unearth programming er...

Privacy groups urge investigation of 'internet of toys'

networkworld.com - Privacy groups in the U.S. and seven European countries will ask consumer protection agencies to investigate the maker of two internet-connected toys for violations of laws designed to protect chil...

Saudi Arabia Has Just Suffered a Series of Major Cyber Hack Attacks

bloomberg.com - State-sponsored hackers have conducted a series of destructive attacks on Saudi Arabia over the last two weeks, erasing data and wreaking havoc in the computer banks of the agency running the count...

Chrome bug triggered errors on websites using Symantec SSL certificates

networkworld.com - If you've encountered errors over the past month when trying to access HTTPS-enabled websites on your computer or Android phone, it might have been due to a bug in Chrome. The bug affected the vali...

Expedia IT guy made $300,000 by hacking own execs

Shared by Matt Egan

money.cnn.com - Jonathan Ly stole passwords and infiltrated devices of Expedia's (EXPE) chief financial officer and head of investor relations, allowing him to make a series of "highly profitable" trades in stock ...

Reality Check: Getting Serious About IoT Security

Shared by !Truppi

darkreading.com - In an effort to curtail a new and disturbing cyberattack trend, the Department of Homeland Security has placed Internet of Things (IoT) device manufacturers on notice. The recent proclamation clari...

Reports: Hackers Steal $31 Million from Russia's Central Bank

bankinfosecurity.com - See Also: Bank Payment Clearance Vulnerabilities: Faster Payments, Faster Fraud? Hackers apparently stole 2 billion rubles (US $31 million) from accounts that banks keep at Russia's central bank in...

Cyber Commission Hopes to Brief Trump Before Christmas

nextgov.com - A commission that recommended sweeping updates to the nation’s cybersecurity protections hopes to brief President-elect Donald Trump’s transition team on its findings before Christmas, the group’s ...

Cryptzone Named 2016 Cyber Defense Magazine Cyber Security Leader

Shared by Cryptzone

prweb.com - Cryptzone, the Software-Defined Perimeter company, today announced that it has been named a 2016 Cyber Security Leader by Cyber Defense Magazine. Recognized for innovative information security solu...

A Botnet Took Down Nearly a Million (Yes, Million) Routers

wired.com - Remember Mirai, that botnet that took down swaths of the internet for millions of users one recent Friday afternoon? We were so innocent then! A variant returned this week, taking out over 900,000 ...

Piña Colada - new Open Source Raspberry pi Wifi Pineapple/Drop Box • /r/netsec

Shared by Cx2H

reddit.com - A community for technical news and discussion of information security and closely related topics. "Give me root, it's a trust exercise" Always link to the original source. Questions belong in the w...

On-campus cybersecurity sometimes impedes academic freedom

theconversation.com - Cybersecurity concerns crop up everywhere you turn lately – around theelection, email services, retailers. And academic institutions haven’t been immune to security breaches either. According to a ...

Choosing Between SSL Implicit, Explicit, and Forced Explicit Modes

Shared by JSCAPE

jscape.com - There will be times when you'll want to transfer files over a secure connection. One option is to use FTPS (FTP over SSL) which provides data-in-motion encryption through SSL (Secure Sockets Layer)...

Combatting cybersecurity unknowns

Shared by Bob Carver

csoonline.com - Former U.S. defense secretary Donald Rumsfeld might well have been speaking to chief security officers when he made a head-scratching statement that immediately entered the realm of famous quotatio...

Where Cybercriminals Go To Buy Your Stolen Data

Shared by Sean Martin

darkreading.com - With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn't just legitimate services - from genealogy sites to public...

Revised Kaspersky Safe Kids: Flexibility For Children; Advice For Parents - Information Security Buzz

informationsecuritybuzz.com - Kaspersky Lab has complemented its solution to protect children against digital threats with new features for iOS and Android platforms. Now, children can remotely ask parents for access to a restr...

Distributed Guessing Attack Reels in Payment Card Data

threatpost.com - Academics at Newcastle University have proven that an attacker in possession of a minimal amount of existing information can, in an automated way, guess payment card data by exploiting weaknesses i...

An unlikely Instagram star: US airport security

stuff.co.nz - It's hard to imagine America's Transport Security Administration (TSA) winning a popularity contest. But there it is, sandwiched between Rihanna and Beyonce on RollingStone.com's 100 best Instagram...

Here's 1.4 billion records from Have I been pwned for you to analyse • /r/netsec

Shared by Cx2H

reddit.com - A community for technical news and discussion of information security and closely related topics. "Give me root, it's a trust exercise" Always link to the original source. Questions belong in the w...

Hackers stole $31 million from Russian banks in 2016, as FSB warns of foreign plot

grahamcluley.com - The original article is included below for transparency. Hackers stole more than 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank said on Friday, the...

5 Reasons Why Election Recounts Are a Mistake --Despite Reports of Hacking

inc.com - While there has been a lot of talk about hackers interfering with our presidential election, and millions of dollars have been raised by the Green Party for a recount of votes cast in at least one ...

Mainframe Key To Digital Transformation For CA Technologies

Shared by Lynne Mahoney

forbes.com - Digital transformation drives disruption, and disruption has been affecting established enterprise software vendors even more than most enterprises. Caught in the jaws of the Innovators’ Dilemma, s...

Password Manager Pro — Easiest Way to Keep Enterprises Secure

thehackernews.com - Recent corporate breaches have taught us something important — the average enterprise user is spectacularly bad at choosing good passwords. As modern enterprise is becoming a hybrid organization wi...

Call For Papers – CircleCityCon 4.0

circlecitycon.com - We are soliciting a diverse lineup of talks for CircleCityCon 4.0. We are particularly interested in hearing from first-time speakers. Some subjects we’re interested in include (but are not limited...

the crux of host discovery shown with NMAP

Shared by bounty hunter

blog.x1622.com - when you are scanning a bigger range of IP adresses to discover all hosts up thats not so easy at is seems. nowadays infrastructure componenets (like firewalls) are not as "noisy" as they was in th...

Infosec news summary - Downclimb 2016.12.04 - Summit Route

Shared by SecureUtah

summitroute.com - "Governments have decreed mass slaughter of potentially infected cattle: surely taking down internet-of-crap devices can be legalized." SkyLined "Some perspective: Tomahawk missile: $1.4M Hellfire:...

Live Analysis of a Process Hollowing

Shared by Will Lymer

attendee.gotowebinar.com - (GMT-11:00) Midway Island, Samoa (GMT-10:00) Hawaii (GMT-09:00) Alaska (GMT-08:00) Pacific Time (US and Canada);Tijuana (GMT-07:00) Arizona (GMT-07:00) Mountain Time (US and Canada) (GMT-06:00) Mex...

Rooting an appliance for fun (and maybe profit?)

mambrui.github.io - A few months back I (finally) tried to get started into bug bounties. The bounty I chose for this first try consisted of a set of different security products. The vendor was offering for this purpo...

Business ID theft: Slow progress in the battle against fraudsters - TechRepublic

Shared by Proofpoint

techrepublic.com - "As a business owner, officer, director, or key executive, you have significantly increased risks over an average consumer because your personal information, credit, and finances are closely intert...

How security can make or break the next IT evolution

businessinsider.com - This post was written by Jeff Schilling, chief of operations and security, Armor. Migrating to the public cloud in at least some capacity is no longer an optional move for the vast majority of comp...

Will Blocking Social Media at Work Stop Security Threats? | ZeroFOX

Shared by Frank Tag

zerofox.com - For the past decade, organizations around the globe have been grappling with how to handle the social media revolution. Certain industries, like retailers and technology companies, have embraced it...

Introducing the Practical Guide on Ransomware

business.kaspersky.com - As a follow-up to our recent foray into ransomware, we’re pleased to offer a fundamental practical guide on how to deal with ransomware. Entitled “Could your business survive a cryptor”, it specifi...

Announcing the new Hybrid Cloud Security for Dummies Guide, HPE Edition

community.hpe.com - It shouldn’t come as a surprise to anyone that security is still one of the top issues that organizations are trying to get their arms around when contemplating the move into a hybrid cloud. We’ve ...

10 open source tools for your sysadmin toolbox

Shared by Hakin9

opensource.com - Sysadmins, no matter what platforms they work on, are awash in great open source software tools. In this article, we highlight well-known—and not-so-well-known—tools that have released new versions...

A curated list of amazingly awesome OSINT • /r/netsec

Shared by Idk.

reddit.com - A community for technical news and discussion of information security and closely related topics. "Give me root, it's a trust exercise" Always link to the original source. Questions belong in the w...

Cybercriminals' Next Target: Short-Term Dangers (Part 1 of 2) - Dark Reading

Shared by Leo

darkreading.com - Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figu...

Europol staff member accidentally leaked 700 pages of serious crime cases

Shared by Piertonio

itproportal.com - A security breach at Europol hash led to around 700 pages of sensitive data related to investigations being leaked online. The EU's law enforcement agency has attributed the leak to an experienced ...

Online credit card fraud up 20% Black Friday to Cyber Monday - Help Net Security

Shared by Somen

helpnetsecurity.com - Iovation released new data that shows card-not-present fraud increased significantly from Black Friday to Cyber Monday 2016 when compared to the same period in past years. Research shows a 20 perce...

Malware Types Explained - Hacking Tutorials

Shared by D4rkY4n

hackingtutorials.org - In this article we will be looking at the different kinds of malware and what they do. When performing static or dynamic malware analysis it is crucial to have a good understanding of the different...

inversepath/qubes-qrexec-to-tcp

github.com - This repository contains Qubes OS customizations to support its Split GPG setup using a TCP connected qubes-gpg-server. The scenario is originally created to support Split GPG with the USB armory d...

Edward Snowden seems surprisingly optimistic about the US election result

Shared by roméo

zdnet.com - Edward Snowden once said that a dystopian America is just an election away. America just had one. And, for a lot of people, things don't seem so great. There are protests in the street, social medi...

The Real Challenges Facing Security Operations Teams

swimlane.com - With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team.  Every day they’re charged w...

lanmaster53/honeybadger

github.com - HoneyBadger is a framework for targeted geolocation. While honeypots are traditionally used to passively detect malicious actors, HoneyBadger is an Active Defense tool to determine who the maliciou...

Editor's note

Please find here the daily Twitter-News shared by knolinfos and my followed tweets, have fun ;-) Check also my blogs on WordPress  and my Security Web Site Internet Monitor (EN, FR, DE) . Interested in Education??? Check here 21st Century  in Education and 21st Century How-To Guide for Teaching-People . Simple steps to secure your PC, Twitter account and Facebook account, check here PC Security-HowTo Secure my PC .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →