Infosecurity News
#RSAC: IBM Embraces the Cloud
In order to provide predictive analytics, actionable, open threat intelligence is a necessary piece of the puzzle.
#RSAC: How CISOs Can Gain the Ear of the Board
The role of the CISO is in a state of flux, as it affects real business processes beyond security, across the organization.
#RSAC: Encryption Hinders Government Fight Against Crime, says Homeland Security Chief
Secretary Jeh Jonson calls for greater collaboration with private sector
#RSAC: Time for Security to Leave the Dark Ages
Amit Yoran, RSA president, says that security must reach Enlightenment
PayPal Points Way to Edible Biometric Devices
Passwords need to perish, says payments giant
APT28 Back in RussianDoll Attack Using Adobe, Windows Flaws
Russian cyber gang aims might at foreign government entity
WikiLeaks Publishes Hacked Sony Docs, Emails
Hundreds of thousands of documents and emails from the Sony hack show “a rare insight into the inner workings of a large, secretive multinational corporation.”
Public-Facing Web Assets Expose Banks to Greater Risk
RiskIQ report claims each bank has 7500 external assets on average
HSBC Notifies Consumers of Mortgage Information Breach
The firm believes the exposure began sometime towards the end of 2014 and continued until March 27, 2015.
IBM Launches Open Threat Intelligence Platform
IBM has debuted a new data-sharing exchange that is modeled off of social networking.
UK Law Firms Putting Client Data at Risk
FoI request finds ICO warning has fallen on deaf ears
Government Report Criticizes Aircraft Cybersecurity
FAA must try harder to prevent mile-high hacking, says GAO
Misconfigured DNS Servers Leak Network Info
US-CERT warns that DNS servers may reveal internal network structure and potentially sensitive information.
LA Plans to Remotely Control Streetlights
There are a number of perks to giving the system the Internet of Things (IoT) treatment, but security concerns abound.
Internet of Evil Things Lurks in Corporate Networks
With more than 16 billion connected devices now deployed, rogue or unauthorized devices could be operating, undetected, across networks.
(ISC)2 Expands Operations in the National Capital Region
The expanded corporate presence reflects the large member concentration that the organization has in the Washington, D.C. area.
Log-in Stealing Attack Builds on 18-Year-Old Flaw
Redirect to SMB could give MITM attackers keys to the kingdom
China Pegged for Long-Running APT 30 Attack Group
Southeast Asia-focused group jumped air gaps to steal info
Moto Modem Flaws Could Give Attackers Full Control
Combination of vulnerabilities is bad news for home internet users
SendGrid Used to Attack Coinbase Bitcoin Exchange
SendGrid offers an easy path to target-rich environments for phishing artists—and Bitcoin is a popular end game.