Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Information Security News - Internet Security | DShield Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago LastPass acknowledges browser extension vulnerability, working on fix

ZDNet View Synopsis+1
Another LastPass vulnerability has been discovered by Google Project Zero hacker Tavis Ormandy. LastPass calls the vulnerability 'unique and highly sophisticated'.

1 day ago As of today, iThings are even harder for police to probe

The Register View Synopsis+1
iOS 10.3 lands, complete with heavily encrypted Apple File System

Apple today released iOS 10.3, watchOS 3.2 and tvOS 10.2 (14W265), the first two of all of which bring some pleasing extra functionality to iThings, But the main attraction in the new release is Apple File System, because it adds comprehensive encryption to the iPhone and Apple Watch.

1 day ago Ease off on the security certifications and focus on these things instead

IT Toolbox Blogs View Synopsis+1

Are you thinking of getting an IT information security-related certification? Perhaps you want to go for Security+, Certified Ethical Hacker (CEH), or, assuming you have the required experience, the CISSP? These certifications not only look good on your resume but, the best part to me, is that you learn some great material along the way. These certifications are valuable and will, no doubt, benefit

1 day ago How to fix disappearing iPhone passwords

ZDNet View Synopsis+1
Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good.

1 day ago Ransomware scammers exploited Safari bug to extort porn-viewing iOS users

ArsTechnica View Synopsis+1
Apple fixes flaw attackers used to trick uninformed users into paying a fine.

Top News

12 hours ago Australia lacks understanding of EU data laws: Veritas

ZDNet View Synopsis+1
With the enforcement of the European Union's General Data Protection Regulation a little over a year away, Veritas Technologies is concerned some Australian organisations are unaware of their compliance requirements.

12 hours ago Conducting a Multi-Currency Gap Analysis: Assembling the Team

IT Toolbox Blogs View Synopsis+1
The JD Edwards functional lead is generally responsible for the JD Edwards implementation at your company and contributes to the business analysis and use case development. The lead should know about the steps involved in the JD Edwards business processes to be automated and integrated.

10 hours ago FCC Privacy Rule a Presidential Signature Away from Being Axed

InfoRiskToday View Synopsis+1
House Votes to Block Implementation of Reg to Require Consumer Approval to Sell Their DataRepublican-backed legislation is a presidential signature away from dismantling a Federal Communications Commission regulation to require internet service providers to ask permission before selling customers' private information to advertisers.

8 hours ago Cerber Ransomware Tries to Evade Machine Learning Security

SecurityWeek View Synopsis+1

The Cerber ransomware is using new evasion techniques designed elude machine learning security solutions, and has been observed being dropped onto compromised systems alongside the Kovter click-fraud Trojan.

5 hours ago If You Don't Know Much About Cybersecurity, You're Not Alone

Forbes View Synopsis+1
The Pew Research Center conducted a survey that presents a grim picture what Americans know about personal cybersecurity. The good news is that you can use the survey along with the information presented here to increase your own online safety.

4 hours ago The evolution of ransomware: How a nuisance turned into a business menace

The Register View Synopsis+1
As ransomware rapidly evolves, defenders look for help keeping up

Promo To many Internet users it must look as if ransomware arrived out of the blue. Pioneers such as Cryzip started circulating at very low levels in the UK as early as 2006 and yet it wasn't until 2013 that this type of malware suddenly spiked with the appearance of its first big global superstar, CryptoLocker.

1 hour ago 5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

TechRepublic View Synopsis+1
Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

20 hours ago A SANS Service Review

SANS Reading Room View Synopsis+1
Security Operations Centers are increasingly important in today's enterprises

Latest News

12 minutes ago Hong Kong Loses 3.7 Million Voter Registration Records

InfoRiskToday View Synopsis+1
Two Backup Laptops Stolen from Locked StoreroomTwo laptops containing as many as 3.7 million voter registration records and other data were stolen from a locked room in Hong Kong. Authorities suspect the theft may be an inside job.

26 minutes ago One of the most prolific botnets is back - and now it's being used for stockmarket scams

ZDNet View Synopsis+1
After a mysterious absence, the Necurs botnet has returned -- and it's moved away from distributing Locky ransomware.

1 hour ago Siemens RUGGEDCOM Devices Affected by Several Flaws

SecurityWeek View Synopsis+1

Siemens has shared recommendations for mitigating several medium and high severity vulnerabilities affecting some of the company's RUGGEDCOM products.

1 hour ago US-CERT's Warning on SSL Interception vs. Security is a False Dichotomy

SecurityWeek View Synopsis+1

Sometimes a headline succinctly and cleverly captures the essence of a simple situation. Note last week's headline about the apprehension of a nearly naked suspect: "Man in Boxers Leads Police on Brief Chase." 

2 hours ago Congress Kills Internet Privacy Protections, Expanding The Market For Your Personal Info

Forbes View Synopsis+1
Under the Obama administration, telecommunications companies were not allowed to collect and sell browser history or other data from smart phones. House Republicans voted Tuesday to reversed those regulations, freeing telecoms to sell your personal data at will. Cartoon by Ted Rall.

3 hours ago 8 Major Cyber Attacks Of 2016 [Infographic]

Forbes View Synopsis+1
The World Wide Web can be a dangerous place and as technology increases it's only getting worse. The truth is most of us have been hacked at one time or another whether we know it or not. We need to start taking steps to protect ourselves.

3 hours ago Russian hacker pleads guilty in global botnet case

ZDNet View Synopsis+1
The Russian man was one of the masterminds behind a get-rich-quick botnet scheme.

3 hours ago NukeBot Source Code Leaked After Marketing Fail

SecurityWeek View Synopsis+1

The developer of the NukeBot banking Trojan has decided to release the malware's source code after he failed to convince the cybercrime community that his creation is worth buying and that he is not a scammer.

10 hours ago The dark allure of Binge-watching is taking over

IT Toolbox Blogs View Synopsis+1

I'm sitting i my office getting ready to write this blog post while the rest of my family is hammering through episodes of Downton Abbey in the next room.  Before I came in, we were serially watching Frasier on Netflix.  If you look a little farther into our video habits, Lost, The West Wing and Medici are all in the running for other binge-watching pleasures.  And that's just

10 hours ago Currency and BAPI_ACC_DOCUMENT_POST

IT Toolbox Blogs View Synopsis+1
You can use a BAPI instead of a BDC to create a manual journal in SAP but this has implications for usability.