Infosecurity News
#infosec16: Security Awareness Raising a Waste of Time, Say Experts
Firms urged to focus on behavioral change through new approaches
#Infosec16: AI Could Transform Security Operations … But Don’t Believe the Hype
Forcepoint deputy CISO makes the case for AI, but warns on current ‘snake oil’ claims
#infosec16: Tactics of Old Are Still Used, says Mikko
The same problems that hit businesses in the 1980s and 1990s have not evolved in modern threat methods.
#infosec16: Levison Wood Urges IT Security Pros to Embrace Risk
As long as it is measured and mitigated, risk can lead to business success, says former Para
#Infosec16: GDPR Will Significantly Impact Almost All Orgs, says Ipswitch's Rich Allen
“They’ve put some serious teeth behind these regulations”
#infosec16 Bromium Offers "Come and Break Us" Challenge
Micro-virtualization vendor Bromium has offered a “Bring-Your-Own-Malware challenge” to delegates at Infosecurity Europe.
Phishing Activity Hits a 12-Year High
The epidemic shows no signs of abating.
Mitsubishi Outlander Flaw Opens Door to Thieves—Literally
The insecure Wi-Fi mechanism allows hackers to disable the anti-theft alarm, flash the lights, tweak charging settings and drain the battery.
Over 100 Million VK.com Customer Records for Sale
Russian Facebook denies breach
Liberty Survey Finds British Opposition to Snoopers Charter
Nine in ten Brits are against the mass surveillance powers contained in the Investigatory Powers Bill.
Stuxnet-like Irongate Malware Emerges to Threaten Critical Infrastructure
The malware targets specific processes within simulated Siemens control system environments.
CryptXXX Adapts Again to Outwit Decryptors
Ransomware family continues to evolve with version 3.1
Russian Ransomware Bosses Make 13 Times the Average Wage
Cybercriminals recognize that holding the data hostage is more lucrative than simply stealing the data and selling it on the black market.
US Federal Reserve Breached 50+ Times in the Last 5 Years
The US central bank is a high-value target that should be well-guarded; but an internal audit showed critical vulnerabilities in its systems.
Survey: Less Than 10% of IoT Devices Keep Data Secure
The connected nature of these products creates unintentional ports to other sensitive and critical systems, data and devices.
SandJacking Attack Can Replace iOS Apps with Malicious Versions
Apple has yet to release a patch
Human Error to Blame as UK Data Breaches Soar
Egress FoI request shows healthcare is once again the worst offender
Cyber OpSec: A Critical Piece in the Battle for Security
Bad guys use operational security to avoid detection and retain attack infrastructure; good guys use it to deny adversaries critical information.
European Data Protection Supervisor Rejects Privacy Shield
Deal should not be ratified in current form, says Buttarelli
Over 5,000 FTSE 100 Log-ins Found on Darknet
Anomali research finds widespread reuse of corporate credentials