Creative Hiring From Non-Traditional Places, (Sat, Jun 23rd)

The lead story in the SANS NewsBites from today was “White House/DHS Announce New Cyber Skills Pipeline Initiative.” The two statements below caught my attention. 1 – “The Federal Government struggles to recruit and…

iPhone pwned? Researcher says he can unlock iOS without running out of tries

A security researcher says he’s found a way to guess iPhone lock codes without getting blocked after 10 mistakes. Source: Naked Security Sophos iPhone pwned? Researcher says he…

The Week in Ransomware – June 22nd 2018 – Scarab Everywhere!

This has been the week of the Scarab with a continuous stream of Scarab Ransomware variants being released. We also had a few decryptors and some smaller variants, but by…

Fortnite Fraudsters Infest the Web with Fake Apps, Scams

Malefactors have doubled down on duping Fortnite enthusiasts, releasing YouTube videos with links to scam versions of the game. And that’s not all. Source: threatpost.com/ Fortnite Fraudsters Infest the…

Ruling Reaffirms Individuals Cannot File HIPAA Lawsuits

Federal Court Dismisses Legal Action by Patient in Privacy CaseA federal court recently dismissed a case filed by a patient alleging a laboratory violated HIPAA by failing to shield her…

US Supreme Court Rules Police Need Warrant to Track Cell Phone Location

In a 5-4 vote, the Supreme Court of the United States (SCOTUS ) ruled today that law enforcement must obtain a search warrant before obtaining and accessing cell phone location…

Malicious App Infects 60,000 Android Devices – But Still Saves Their Batteries

A battery-saving app enables attackers to snatch text messages and read sensitive log data – but it also holds true to its advertising. Source: threatpost.com/ Malicious App Infects 60,000…

CISO Thom Langford's Top Tips for GDPR Compliance

Start With ISO 27001 and a Solid Information Security Management SystemWhen communications giant Publicis Groupe launched its GDPR compliance project, CISO Thom Langford says, “it was more a case of…

Enterprise IT/OT: Better Collaboration, But Not Perfect

Groups Increasingly Share Responsibilities, Says Tripwire’s Tim ErlinTo better secure all internet-connected devices inside an enterprise, operational technology and information technology groups are increasingly collaborating, says Tripwire’s Tim Erlin. …

How Contextual Data on Domains Helps Combat Online Attacks

Michael Jones of Domain Tools on Scoring Threats, Blocking Phishing AttacksMichael Jones of Domain Tools says that studying domain ownership information gives organizations “contextual data around domains that may be…

Supreme Court Bolsters Mobile-Phone Privacy Rights

Supreme Court decision requires law enforcement to obtain a warrant to gain access to cellphone records for tracking citizens. Source: threatpost.com/ Supreme Court Bolsters Mobile-Phone Privacy Rights

Tesla Breach: Malicious Insider Revenge or Whistleblowing?

Just before midnight last Sunday evening (June 17, 2018), Elon Musk sent an email to all staff. He was dismayed, he said, to learn about a Tesla employee “making direct…

"Wavethrough" Bug in Microsoft Edge Leaks Sensitive Information

A security vulnerability <span style=”color: #0563c1; background-color: transparent; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-position: normal; -webkit-text-decoration-skip: none; vertical-align: baseline; white-spa read more Source: Security Week…

WinDynamicDesktop Brings the macOS Dynamic Desktop Feature to Windows 10

macOS Mojave includes a feature called Dynamic Desktop that causes your wallpaper to cycle through 16 images of the same scene throughout a day. When developer Timothy Johnson saw this…

DDoS-Happy ‘Bitcoin Baron’ Sentenced to Almost 2 Years in Jail

Far from being a simple hacktivist filled with an impulse for social justice, a different picture emerges when his activity is collated together. Source: threatpost.com/ DDoS-Happy ‘Bitcoin Baron’ Sentenced…

Next Page