security.didici.cc

Critical Infrastructure: The Next Cyber-Attack Target

1 hour ago

Power and utilities companies need a risk-centric cybersecurity approach to face coming threats.

View details »

Apple Patents Collecting Biometric Information Based on Unauthorized Device Use

1 hour ago

Apple received a patent earlier this year on collecting biometric information of an unauthorized device user. The obvious application is taking a copy of the fingerprint and photo of someone using as stolen smartphone. Note that I have no opinion on whet ...

View details »

​Victorian government gives Dimension Data AU$450k for cybersecurity

10 hours ago

The Victorian government has handed out AU$6.5 million in the first round of LaunchVic funding, including AU$450,000 to Dimension Data for a cybersecurity incubator.

View details »

Opera resets passwords after sync server hacked

18 hours ago

But the company won't say how the passwords are stored, which may indicate if they can be unscrambled by an attacker.

View details »

Russian MP's Son Convicted Of Hacking Scheme

21 hours ago

View details »

Friday Squid Blogging: Self-Repairing Fabrics Based on Squid Teeth

2 days ago

Really: As shown in the video below, researchers at Pennsylvania State University recently developed a polyelectrolyte liquid solution made of bacteria and yeast that automatically mends clothes. It doesn't have a name yet, but it's almost miraculous. S ...

View details »

Multiple Apple iOS Zero-Days Enabled Security Firm To Spy On Targeted iPhone Users For Years

2 days ago

Victims of 'lawful intercepts' include human rights activists and journalist, researchers from Citizen Lab and Lookout say.

View details »

Multiple Apple iOS Zero-Days Enabled Security Firm To Spy On Targeted iPhone Users For Years

2 days ago

Victims of 'lawful intercepts' include human rights activists and journalist, researchers from Citizen Lab and Lookout say.

View details »

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says

2 days ago

Start saving now.The global cost of cybercrime could reach $6 trillion by 2021, according to a Cybersecurity Ventures report.

View details »

Collision Attacks Against 64-Bit Block Ciphers

2 days ago

We've long known that 64 bits is too small for a block cipher these days. That's why new block ciphers like AES have 128-bit, or larger, block sizes. The insecurity of the smaller block is nicely illustrated by a new attack called "Sweet32." It exploits t ...

View details »

Pacemaker Hacking Fears Rise With Critical Research Report

2 days ago

Researcher warn medical devices made by St. Jude Medical are at risk of attacks via SSH certificate reuse vulnerabilities and static credentials that can easily give hackers root access to key monitoring equipment.

View details »

How To Bullet Proof Your PAM Accounts: 7 Tips

2 days ago

Recent studies demonstrate the need for companies to focus more on their privileged users.

View details »

Dropbox prompts users to reset old passwords

2 days ago

Dropbox called out to users who haven't changed their passwords since mid-2012, saying the login credentials are potentially at risk and should be updated.

View details »

Apple Tackles iPhone One-Tap Spyware Flaws

2 days ago

View details »

Dropbox Email Warns Users That Old Passwords Must Be Reset

2 days ago

View details »

Homeland Security Investigating Leslie Jones Website Hack

2 days ago

View details »

St. Jude Stock Shorted On Heart Device Hacking Fears; Shares Drop

2 days ago

View details »

The Hidden Dangers Of 'Bring Your Own Body'

2 days ago

The use of biometric data is on the rise, causing new security risks that must be assessed and addressed.

View details »

Threatpost News Wrap, August 26, 2016

2 days ago

Mike Mimoso and Chris Brook discuss the news of the week, including the latest on ShadowBrokers and Cisco, Sweet32, decryptors for the Wildfire ransomware, and some gaming forum breaches.

View details »

The NSA is Hoarding Vulnerabilities

3 days ago

The National Security Agency is lying to us. We know that because of data stolen from an NSA server was dumped on the internet. The agency is hoarding information about security vulnerabilities in the products you use, because it wants to use it to hack o ...

View details »

Australian data breach alerts bill to hit parliament

3 days ago

Will Australia finally get a notification scheme?

View details »

​Monitoring SSL traffic now everyone's concern: A10 Networks

3 days ago

As the uptake of SSL grows, Tim Blombery, systems engineer at A10 Networks, said threat actors are increasingly leveraging SSL-based encryption to hide malicious activity.

View details »

US court convicts Russian politician's son for hacking

3 days ago

Stole 2.9 million credit card numbers.

View details »

VPN ban to protect copyright discriminatory, will drive users underground

3 days ago

As the Singapore government mulls over the role of VPNs in bypassing geo-blocks, any potential ban will unfairly penalise the use of such tools for security and privacy reasons and may drive content users to illegal downloads.

View details »

Apple issues emergency patch for exploited iOS zero-days

3 days ago

‘Trident’ vulnerability used to attack media and activists.

View details »

Emergency iOS Update Patches Zero Days Used by Government Spyware

3 days ago

Apple rushed an emergency iOS update that patches three zero days being exploited in spyware sold to oppressive governments to monitor human rights activists and journalists.

View details »

CrowdStrike Integrates Scanning Engine, Rejoins VirusTotal

3 days ago

Machine Learning engine first in virus-scanning service to provide confidence levels with results, vendor says.

View details »

CrowdStrike Integrates Scanning Engine With VirusTotal

3 days ago

Machine Learning engine first in virus-scanning service to provide confidence levels with results, vendor says.

View details »

France, Germany Call for European Decryption Law

3 days ago

France's and Germany's Interior Minister are urging the EU to consider implementing a law to get companies to decrypt encrypted communications.

View details »

Apple Releases Patch For 'Trident,' A Trio Of iOS 0-Days

3 days ago

Already rolled into the Pegasus spyware product and used to target social activists, the vulnerabilities are fixed in iOS 9.3.5.

View details »

Keystroke Recognition Uses Wi-Fi Signals To Snoop

3 days ago

Researchers develop WiKey technology that can sniff out keystrokes with 97.5 percent accuracy using an off-the-shelf Wi-Fi router and a $200 laptop.

View details »

nullcon 8-bit Call for Papers is open

3 days ago

Posted by nullcon on Aug 25Dear Hackers and Security Pros, Welcome to nullcon 8-bit! nullcon is an annual security conference held in Goa, India. The focus of the conference is to showcase the next generation of offensive and defensive security technology ...

View details »

Apple releases "important security update" for iPhone after spyware discovery

3 days ago

The patch comes after the discovery of spyware circulating in the Middle East.

View details »

VMware Patches Flaws in Identity and Cloud Products

3 days ago

VMware this week patched its Identity Manager and vRealize Automation products against privilege escalation and remote code execution vulnerabilities.

View details »

Confusing Security Risks with Moral Judgments

3 days ago

Interesting research that shows we exaggerate the risks of something when we find it morally objectionable. From an article about and interview with the researchers: To get at this question experimentally, Thomas and her collaborators created a series o ...

View details »

Rio Olympics: the technology numbers

3 days ago

The most recent Summer Olympiad staked its place in history as the competition with the highest levels of digital engagement than any previous Olympic Games. We look at some of the key technology numbers behind the Rio events.

View details »

The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target

3 days ago

How the networking industry has fallen way behind in incorporating security measure to prevent exploits to ubiquitous routers, proxies, firewalls and switches.

View details »

The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target

3 days ago

How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches.

View details »

Old News - Hackers Are Targeting News Organizations

3 days ago

View details »

Major Update Drops For Pwntools Penetration Showbag

3 days ago

View details »

French, German Ministers Demand New Encryption Backdoor Law

3 days ago

View details »

WhatsApp Is Going To Share Your Data With Facebook, FFS

3 days ago

View details »

Hacker 1x0123 Claims He Has More Leaked NSA Files To View - If You Can Solve This Puzzle

3 days ago

View details »

Tor Update Fixes ReachableAddresses Problem

3 days ago

Tor updated its software to 0.2.8.7 and fixed a number of issues, including a bug in the ReachableAddresses option that possibly degrades anonymity.

View details »

A Temperature-Check On The State Of Application Security

4 days ago

AppSec is more dangerous than network security but receives less than half the funding, according to new Ponemon study.

View details »

Is your Android phone being controlled by a rogue Twitter account? Botnet is first to receive commands via tweets

4 days ago

ESET researchers say by using Twitter to orchestrate infected devices, Twitoor is the first malicious software of its kind.

View details »

Auth0 raises $15 million to let you know when you've been pwned

4 days ago

The authentication startup's software will inform users when their passwords have been compromised elsewhere.

View details »

Sony finally enables two factor authentication for PlayStation Network users

4 days ago

You can now add an additional layer of security to your account -- despite how late the feature has arrived.

View details »

Chinese Spies May Be Watching You

4 days ago

View details »

Hackers Nab 25 Million Accounts In Another Mail.ru Breach

4 days ago

View details »

​APAC unprepared for security breaches: FireEye's Mandiant

4 days ago

Cyberforensics firm Mandiant has reported that APAC organisations are frequently unprepared to identify and respond to breaches, with a median response time of 374 days over that of the global median.

View details »

Russian Cyberspies' Leaked Hacks Could Herald New Normal

4 days ago

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say.

View details »

Cisco Begins Patching Equation Group ASA Zero Day

4 days ago

Cisco today began the process of patching a zero-day vulnerability in its Adaptive Security Appliance (ASA) software exposed in the ShadowBrokers data dump.

View details »

French Submarine Firm Claims Economic Warfare After Massive Data Leak

4 days ago

The Australian publishes over 22,000 documents on six DCNS Scorpene subs that are being built in India

View details »

GTAGaming Hack Blamed on Old vBulletin Software

4 days ago

A breach that exposed 200,000 Grand Theft Auto fan forum users' email addresses and private data is being blamed on an exploit of outdated and vulnerable vBulletin software.

View details »

Leaked ShadowBrokers Attack Upgraded to Target Current Versions of Cisco ASA

4 days ago

Researchers at Silent Signal have ported the ShadowBrokers' Equation Group exploit for Cisco ASA firewalls to newer versions of the product.

View details »

Security Leadership & The Art Of Decision Making

4 days ago

What a classically-trained guitarist with a Master's Degree in counseling brings to the table as head of cybersecurity and privacy at one of the world's major healthcare organizations.

View details »

Wildfire Ransomware Campaign Disrupted

4 days ago

Victims of the mostly Dutch-leaning ransomware WildFire can now get their files back without paying attackers.

View details »

Over 25 million accounts stolen after Mail.ru forums hacked

4 days ago

Two hackers were able to steal email addresses and easily crackable passwords from three separate forums in this latest hack.

View details »

Ashley Madison Agrees To Security Overhaul After Damning Report

4 days ago

View details »

Wildfire Ransomware Code Cracked - Unlock For Free

4 days ago

View details »

New Collision Attacks Allow For Cookie Decryption

4 days ago

View details »

Instagram Scam Preys On Bank Followers

4 days ago

View details »

When Securing Your Applications, Seeing Is Believing

4 days ago

While the cloud is amazing, a worrying lack of visibility goes along with it. Keep that in mind as you develop your security approach.

View details »

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

5 days ago

Researchers have found a new way to recover and decrypt authentication cookies from 3DES and Blowfish protected traffic. In response, OpenSSL is expected to deprecate 3DES' designation from high to medium.

View details »

Wildfire ransomware code cracked: Victims can now unlock encrypted files for free

5 days ago

Victims of a ransomware campaign aimed at Dutch speakers don't have to pay hackers after the No More Ransom project cracked its cipher.

View details »

GozNym Trojan spreads to attack German banks

5 days ago

The financial Trojan's reach continues to expand, placing our banks and accounts at risk.

View details »

Singapore opens lab for fintech experiments

5 days ago

Monetary Authority of Singapore sets up a fintech lab to provide a platform on which startups, tech vendors, and financial institutions can test out new tools.

View details »

Pilgrim finds Ashley Madison breached Australian Privacy Act

5 days ago

A joint investigation into the Ashley Madison data breach conducted by the Australian Privacy Commissioner and the Privacy Commissioner of Canada has been completed, confirming Ashley Madison breached both countries' privacy acts.

View details »

Federal government claims DCNS data leak has 'no bearing' on Australia

5 days ago

Australia has not been affected by leaked documents revealing details around the combat capability of submarines that French company DCNS built for the Indian Navy, the government has said.

View details »

AFP raids Parliament House over NBN leaks

5 days ago

Updated: Labor claims parliamentary privilege over new files seized.

View details »

Hit-And-Run Tactics Fuel Growth In DDoS Attacks

5 days ago

A majority of organizations in Imperva DDoS study suffer multiple consecutive attacks.

View details »

France, Germany push for access to encrypted messages after wave of terror attacks

5 days ago

But it conflicts with a recent review of EU privacy rules, which concluded that the use of encryption should be encouraged.

View details »

OAIC slams Ashley Madison's dodgy security

5 days ago

Hacked infidelity website was legally obliged to do better.

View details »

Wikileaks email dump riddled with malware

5 days ago

Thousands of direct links to viruses and ransomware.

View details »

Ransomware Costs Enterprises $209M In 1H 2016

5 days ago

New report from Trend Micro shows the addition of ransomware families in first half of the year nearly doubled numbers for new families found in all of 2015.

View details »

Interesting Internet-Based Investigative Techniques

5 days ago

In this article, detailing the Australian and then worldwide investigation of a particularly heinous child-abuse ring, there are a lot of details of the pedophile security practices and the police investigative techniques. The abusers had a detailed manua ...

View details »

Reporters At New York Times And Other Media Hit By Russian Hackers

5 days ago

CNN reports an FBI investigation into an even wider victim base in recently exposed cyber spy operations focusing on the US presidential campaign.

View details »

Reporters At New York Times And Other Media Targeted By Russian Hackers

5 days ago

CNN reports an FBI investigation into an even wider victim base in recently exposed cyber spy operations focusing on the US presidential campaign.

View details »

Epic Games Forums Hacked, SQL Injection Vulnerability Blamed

5 days ago

A SQL injection vulnerability is being blamed in the hack of 800,000 users accounts for popular gaming forums run by Epic Games.

View details »

GozNym Banking Trojan Targeting German Banks

5 days ago

Fresh from targeting banks in Poland, the banking Trojan GozNym has begun taking aim at banks in Germany.

View details »

CISO Security 'Portfolios' Vs. Reporting Structures

5 days ago

Organizational structure is a tool for driving action. Worrying about your boss's title won't help you as much as a better communication framework.

View details »

US faces pushback on proposals to collect tourists' social media handles

5 days ago

Rights groups worry that a refusal to disclose may hurt visa applications.

View details »

SAINTCON 2016 Details

5 days ago

Posted by Troy Jessup on Aug 23SAINTCON 2016 DETAILS SAINT CON (SAINT is an Acronym for "Security Advisory and Incident Network Team") is a moderate sized hacking conference based in Utah. SAINTCON is a non-profit event where we provide a security confe ...

View details »

Timing of Browser-Based Security Alerts Could Be Better

5 days ago

New academic research shows that security warnings should be better timed to pop up when computers users are less likely to be multitasking.

View details »

Singapore to review VPN role in copyright infringement

5 days ago

Government seeks public feedback on proposed changes to the country's copyright laws to keep pace with technological developments, including a review of VPN's role in circumventing geo-blocks.

View details »

Californian Gets 50 Months In Prison For Chinese Spy Work

5 days ago

View details »

Opera Brings Standalone VPN App To Android Devices

5 days ago

View details »

No Surprise: Linguist Notices NSA Hack Was Written By English Speaker Trying To Hide

5 days ago

View details »

Epic's Forums Hacked Again, With Thousands Of Logins Stolen

5 days ago

View details »

Anatomy Of A Social Media Attack

5 days ago

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

View details »

Juniper confirms leaked NSA exploits affect its firewalls

5 days ago

Shy on details, the company wouldn't say when patches would become available.

View details »

Privacy Implications of Windows 10

6 days ago

The EFF has a good analysis of all the ways Windows 10 violates your privacy.

View details »

Has your internet provider been compromised? Malicious insiders are helping cybercriminals hack telecoms firms

6 days ago

Hackers are using both willing and blackmailed staff at internet and phone providers to help them breach networks and steal data.

View details »

FBI uncovers 14,900 new Clinton emails

6 days ago

Judge orders State Department to review.

View details »

Epic's forums hacked again, with thousands of logins stolen

6 days ago

More than 800,000 usernames and email addresses were taken, but most of the passwords aren't readable or easily crackable.

View details »

Obihai Patches Memory Corruption, DoS, CSRF Vulnerabilities in IP Phones

6 days ago

Obihai Technology recently patched a slew of issues in its ObiPhone IP phone products that could have led to memory corruption, a buffer overflow, and denial of service conditions, among other outcomes.

View details »

Hacktivists Take Aim At Olympics Broadcast Service

6 days ago

Broadcasts and images of Games left intact, but employee contact information apparently breached.

View details »

Meet The 2016 PWNIE Award Winners

6 days ago

Contest celebrating the best and worst in information security celebrates its 10th year.

View details »

Hancitor Downloader Shifts Attack Strategy

6 days ago

Macro-based attacks are a dime a dozen, but a new Hancitor variant illustrates how cybercriminals are upping their game when it comes building more sophisticated malicious attachments.

View details »

Seized Silk Road Wallet Payments In Shadow Brokers Exploit Auction Come Under Scrutiny

6 days ago

View details »

Four In Five Android Devices Inherit Linux Snooping Flaw

6 days ago

View details »

EFF Slams Disregard For User Privacy With Windows 10

6 days ago

View details »

How Bitcoin Helped Fuel An Explosion In Ransomware Attacks

6 days ago

View details »

Juniper Acknowledges Equation Group Exploits Target ScreenOS

6 days ago

Juniper Networks on Friday acknowledged that exploits contained in the ShadowBrokers data dump target NetScreen firewalls running ScreenOS.

View details »

Eddie Bauer Confirms Payment Card Breach of US, Canadian Stores

6 days ago

Clothing store Eddie Bauer has become the latest retail store to acknowledge that malware has led to a breach of its point of sale systems.

View details »

Research on the Timing of Security Warnings

1 week ago

fMRI experiments show that we are more likely to ignore security warnings when they interrupt other tasks. A new study from BYU, in collaboration with Google Chrome engineers, finds the status quo of warning messages appearing haphazardly­ -- while peop ...

View details »

How Bitcoin helped fuel an explosion in ransomware attacks

1 week ago

Secure payment system Bitcoin has many legitimate uses, but like other technologies, it's also been beneficial to cybercriminals seeking new ways to extort money.

View details »

Seized Silk Road bitcoin used to fund Shadow Brokers exploit auction

1 week ago

It may be that the US government is keen to stop the exploit cache from ending up in external hands.

View details »

Californian woman sent behind bars for trying to sell US fighter jet tech to China

1 week ago

The 45-year-old worked with a Chinese associate to find buyers for items including high-tech jet engines.

View details »

Australia Post details plan to use blockchain for voting

1 week ago

Postal service wants to begin with small corporate and civic elections before ramping up to handle a full parliamentary election.

View details »

Gold Coast Commonwealth Games could swap sponsorship for cyber protection

1 week ago

Security supplier sought for high-profile event.

View details »

New Snowden Docs Support Claim Of NSA Cyberweapon Hack

1 week ago

View details »

New Brazilian Banking Trojan Uses Windows Powershell Utility

1 week ago

View details »

T-Mobile Deal May Breach US Net Neutrality Rules

1 week ago

View details »

WikiLeaks Uploads 300+ Pieces Of Malware Among Email Dumps

1 week ago

View details »

Windows 10 Update Breaks Most Webcams

1 week ago

Now's your chance....

View details »

Eddie Bauer Reports Intrusion Into Point of Sale Network

1 week ago

Data belonging to customers who used payment cards at all 370 Eddie Bauer locations in the US, Canada compromised.

View details »

Friday Squid Blogging: Stubby Squid

1 week ago

Photo of the cutest squid ever. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

View details »

Terrorist False Alarm at JFK Airport Demonstrates How Unprepared We Really Are

1 week ago

The detailed accounts of the terrorist-shooter false-alarm at Kennedy Airport in New York last week illustrate how completely and totally unprepared the airport authorities are for any real such event. I have two reactions to this. On the one hand, this ...

View details »

Unintentional DOS Attack against Car-Door Openers

1 week ago

Radio noise from a nearby neon-sign transformer made it impossible for people to unlock their cars remotely.

View details »

The tech legacy of the Rio Olympics

1 week ago

From improved connectivity to skills creation, we look into some of the technology benefits that Games host city Rio de Janeiro - as well as all of Brazil - will retain after the sporting competitions end.

View details »

New Brazilian Banking Trojan Uses Windows PowerShell Utility

1 week ago

A new sophisticated banking Trojan targeting Brazilians via a malicious .PIF file that changes browser proxy settings.

View details »

Multiple Vulnerabilities Identified in ‘Utterly Broken’ BHU Routers

1 week ago

Researchers have identified a router so fraught with vulnerabilities and so “utterly broken” that it can be exploited to do pretty much anything.

View details »

Is blockchain revolutionary, or just another infrastructure support technology?

1 week ago

The leading Bitcoin proponent fears blockchain is becoming too unwieldy to manage. A security expert suggests it will meld into the woodwork, calling it the 'PKI of the 21st century.'

View details »

FireEye Probes Suspected Breach Of Clinton Charity Site: Sources

1 week ago

Officials say attackers reportedly employed same technique as used in Russia-backed hacking of Democratic Party groups.

View details »

Darknet: Where Your Stolen Identity Goes to Live

1 week ago

Almost everything is available on the Darknet -- drugs, weapons, and child pornography -- but where it really excels is as an educational channel for beginning identity thieves.

View details »

Snowden documents confirm that leaked hacking tools belong to NSA

1 week ago

Documents suggest a smoking gun between the US intelligence agency and the malware it allegedly developed.

View details »

Employee Arrested For Breach At Software Firm Sage

1 week ago

Woman detained at Heathrow Airport for data fraud conspiracy impacting over 200 businesses.

View details »

Australian census debacle generates both troubling and encouraging signs for privacy

1 week ago

The census website's failure has flared up a major debate over individual privacy Down Under.

View details »

Threatpost News Wrap, August 19, 2016

1 week ago

Mike Mimoso and Chris Brook discuss the news of the week, including the Shadow Brokers debacle, the VeraCrypt audit, Pokemon ransomware, and a browser address bar vulnerability.

View details »

Need a tamper-proof, encrypted PC? The portable, open-source ORWL could be what you're looking for

1 week ago

If you're paranoid about someone gaining physical access to your computer, the palm-sized ORWL could put your mind at ease.

View details »

Eddie Bauer says point of sales system was infected with malware

1 week ago

US clothing retailers warns customers that hackers may have had access to customer card data.

View details »

More on Election Security

1 week ago

Andrew Appel has a good two-part essay on securing elections. And three organizations -- Verified Voting, EPIC, and Common Cause -- have published a report on the risks of Internet voting. The report is primarily concerned with privacy, and the threats ...

View details »

Wikileaks hosts hundreds of malware files in email dumps

1 week ago

The confidential file publisher has not considered the security implications of mass email uploads, it seems.

View details »

Bitcoin.org suspects state-sponsored attacks on the horizon

1 week ago

Bitcoin traders have been warned that the upcoming Bitcoin Core software release will become a top target for well-funded hacking groups.

View details »

'Massive' Locky ransomware campaign targets hospitals

1 week ago

FireEye researchers have spotted a surge in cyberattacks on hospitals in the US - and they're using a new infection technique

View details »

My Health Record 'dumb and useless': Australian Privacy Foundation

1 week ago

Forget last week's Census debacle. Far more has been spent on an e-health system with little clinical value and fewer than 17 percent of Australians on board.

View details »

3 Takeaways From The HEI Hotels And Oracle MICROS Breaches

1 week ago

Attacks another reminder of the fragility of the US payment system.

View details »

NEC acquires Brazilian cybersecurity firm Arcon

1 week ago

The deal is part of the Japanese firm's plans to strengthen its security offering.

View details »

DNSSEC abusable for massive DDoS amplification attacks

1 week ago

Turn off 'ANY' query responses now.

View details »

EFF Blasts Microsoft Over ‘Malicious’ Windows 10 Rollout Tactics

1 week ago

EFF holds nothing back when it comes to criticism over Microsoft’s Get Windows 10 app along with new Windows 10 privacy policies.

View details »

How Diversity Can Bridge The Talent Gap

1 week ago

Women and minorities in the security industry share some hard truths about the security industry's hiring traditions and practices.

View details »

Security Staff Shortages Incur Higher Breach Recovery Costs

1 week ago

New study measures the financial impact of a breach on a company short on IT security staff.

View details »

Millions of Steam game keys stolen after hacker breaches gaming site

1 week ago

The data also includes an estimated 3.3 million unique site and forum accounts.

View details »

OIG Report Finds Vulnerabilities in Medicaid Services Agency

1 week ago

Vulnerabilities in Centers for Medicare & Medicaid Services could result in the disclosure of personally identifiable information and the “disruption of critical operations,” a government watchdog warned this week.

View details »

EFF rips Microsoft for "blatant disregard of user choice and privacy" in Windows 10

1 week ago

In a signed editorial, a staffer from the Electronic Frontier Foundation has blasted Microsoft for its aggressive Windows 10 upgrade program (now ended), and also criticized its privacy defaults.

View details »

GPG Patches 18-Year-Old Libgcrypt RNG Bug

1 week ago

New versions of GPG and its crypto library Libgcrypt were released on Wednesday addressing a vulnerability that could allow an attacker to predict Libgcrypt RNG output.

View details »