Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Information Security News - Internet Security | DShield Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Amazon Calls for Government Regulation of Facial Recognition Tech

SecurityWeek View Synopsis+1

Amazon is endorsing the idea of government regulation of facial recognition technology, as part of a wide-ranging statement of its principles on a range of social and political issues.

2 days ago Imperva cloud firewall pwned, how Teamviewer was ransacked, D-Link bug uncovered, etc

The Register View Synopsis+1
Plus, Visual Studio Code debug hole found

Roundup It's time for another security news catch-up.…

2 days ago Imperva cloud firewall pwned, D-Link bug uncovered - plus more

The Register View Synopsis+1
Including: Visual Studio Code debug hole found

Roundup It's time for another security news catch-up.…

2 days ago Compromised AWS API Key Allowed Access to Imperva Customer Data

SecurityWeek View Synopsis+1

Imperva has shared more information on how hackers managed to obtain information on Cloud Web Application Firewall (WAF) customers, and revealed that the incident involved a compromised administrative API key.

2 days ago Thoma Bravo to buy Sophos for $3.9 billion

ZDNet View Synopsis+1
Sophos board of directors said they plan to "unanimously recommend?" the acquisition offer? to their shareholders.

Top News

1 day ago How to disable Facebook location tracking

TechRepublic View Synopsis+1
If your privacy is more important than Facebook knowing exactly where you are at all times, you might want to disable location tracking.

1 day ago California Attorney General Outlines How State Will Enforce Upcoming Privacy Law

SecurityWeek View Synopsis+1

The California Attorney General Xavier Becerra has released the draft proposed regulations on how the state will enforce the California Consumer Protection Act (CCPA) that comes into force on January 1, 2020.

1 day ago Apple responds to reports that it sends user traffic to China's Tencent

ZDNet View Synopsis+1
Apple explains how Safari's recent Safe Browsing update works -- following a slew of misleading media reports.

1 day ago Pitney Bowes: Can we be frank? Ransomware has borked our dead-tree post systems

The Register View Synopsis+1
Venerable stamp meter sellers stalled by server breakdown

Pitney Bowes, the US stamping meter maker, has been infected with ransomware, leaving customers unable to top-up their equipment with credit nor access the corporate web store.…

1 day ago CCPA Amendments Signed; Draft Regulations Released

InfoRiskToday View Synopsis+1
Officials Attempt to Clarify Complex California Law's RequirementsGov. Gavin Newsom has signed into law six amendments to the California Consumer Privacy Act as well as another bill updating the state's long-standing data breach law. Meanwhile, draft CCPA implementation regulations have been unveiled.

Latest News

39 minutes ago WAV audio files are now being used to hide malicious code

ZDNet View Synopsis+1
Steganography malware trend moving from PNG and JPG to WAV files.

56 minutes ago Oracle's October 2019 Critical Patch Update Includes 219 Fixes

SecurityWeek View Synopsis+1

Oracle this week announced the release of its last Critical Patch Update of 2019, which includes a total of 219 new security fixes across various product families.

56 minutes ago Ransomware Attacks: STOP, Dharma, Phobos Dominate

InfoRiskToday View Synopsis+1
GlobeImposter 2.0 and Sodinokibi Strikes Also Common, Researchers FindRansomware is once again the most common illicit profit-making tool in online attackers' arsenal, law enforcement officials warn. Security firm Emsisoft says the most-seen strains in recent months include STOP, Dharma .cezar, Phobos, GlobeImposter 2.0 and Sodinokibi. Less widely seen Ryuk also continues to generate big profits.

1 hour ago Huawei Says Nine-Month Revenue Up Despite US Pressure

SecurityWeek View Synopsis+1

Chinese tech giant Huawei said on Wednesday that its revenue for the first nine months of the year grew by almost a quarter despite a US campaign to isolate the company globally.

Huawei's revenues jumped 24.4 percent on-year to 610.8 billion yuan ($86.2 billion) and its profit margin increased 8.7 percent, it announced.

2 hours ago WordPress 5.2.4 Patches Six Vulnerabilities

SecurityWeek View Synopsis+1

WordPress 5.2.4, which WordPress developers released this week, patches six vulnerabilities, including cross-site scripting (XSS), unauthorized access, server-side request forgery (SSRF), and cache poisoning issues.

2 hours ago Huawei can work on German 5G networks: Here's why critics say that's a very bad idea

ZDNet View Synopsis+1
New draft German network security rules have just opened the door to Huawei, sparking an outcry.

2 hours ago Cybersecurity: Why your suppliers are still your weakest link

ZDNet View Synopsis+1
Mature organisations at the top of the supply chain have a duty of care to their suppliers - and that can help everyone.

2 hours ago How to password protect a zip file in Linux

TechRepublic View Synopsis+1
If you need to password protect a zip file, look no farther than the zip command itself.

2 hours ago 3 Key Risks with Employee Passwords in the Financial Services Industry

InfoRiskToday View Synopsis+1
How can financial services institutions better protect employee passwords?

One of the most common threat vectors plaguing financial services institutions is the employee password.

3 hours ago How to protect your organization's website against typosquatting

TechRepublic View Synopsis+1
Hundreds of fake domains have been set up against some of the presidential candidates through typosquatting, according to a report from digital risk company Digital Shadows.

4 hours ago IoT in Vehicles: The Trouble With Too Much Code

InfoRiskToday View Synopsis+1
The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of Blackberry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.