May 20 2019

Millions of Instagram influencers had their private contact data scraped and exposed

Category: data security,Security BreachDISC @ 4:04 pm

Millions of Instagram influencers had their private contact data scraped and exposed

A massive database containing contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The database, hosted by Amazon Web Services, was left exposed and without a password allowing anyone to look inside. At the time of writing, the database had over 49 million records — but was growing by […]

Source: Millions of Instagram influencers had their private contact data scraped and exposed – TechCrunch


 Subscribe in a reader


May 19 2019

AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services

Category: AWS SecurityDISC @ 1:00 pm

In the weeks leading up to re:Inforce, we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that they’re doing. You’ve worn a lot of hats at AWS. What do you do in your current role, […]

Source: AWS Security Profiles: Tracy Pierce, Senior Consultant, Security Specialty, Remote Consulting Services | Amazon Web Services


 Subscribe in a reader

Tags: AWS, AWS security


May 16 2019

Microsoft renewed its Attack Surface Analyzer, version 2.0 is online

Category: Cyber ThreatsDISC @ 10:52 am

Microsoft has renewed its Attack Surface Analyzer tool (version 2.0) to take advantage of modern, cross-platform technologies.

Source: Microsoft renewed its Attack Surface Analyzer, version 2.0 is online


 Subscribe in a reader

Tags: Cyber Threat


May 15 2019

Virus Removal Tool

Category: AntivirusDISC @ 10:30 pm

Virus Removal Tool

Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.

Source: Sophos Virus Removal Tool


 Subscribe in a reader

Tags: Free antivirus, Virus Removal Tool


May 14 2019

California is bringing law and order to big data. It could change the internet in the U.S.

Category: Information PrivacyDISC @ 9:59 am

   ⚖️ California is bringing law and order to big data ⚖️

California Expands Consumer Privacy Protections | The California Consumer Privacy Act, or CCPA, gives residents of California the ability to request the data that businesses collect on them, demand that it be deleted, and opt out of having that data sold to third parties, among other things.

The state’s attorney general wants to avoid a troubled rollout, à la Obamacare, when the far-reaching restrictions on user data go into effect on Jan. 1.

Source: California is bringing law and order to big data. It could change the internet in the U.S.

here’s the no paywall copy of the article… https://archive.fo/NmU9E


 Subscribe in a reader

Tags: California Consumer Privacy Act, CCPA


May 13 2019

Most popular programming languages on stack overflow

Category: App Security,PythonDISC @ 4:26 pm

Most popular programming languages


 Subscribe in a reader


May 12 2019

Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

Category: HackingDISC @ 9:09 pm

The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.

Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark


 Subscribe in a reader


May 09 2019

7 Types of Experiences Every Security Pro Should Have

Category: CISO,InfoSec jobsDISC @ 2:25 pm

As the saying goes, experience is the best teacher. It’ll also make you a better and more well-rounded security pro.

Source: 7 Types of Experiences Every Security Pro Should Have

 Subscribe in a reader


May 09 2019

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Category: Security BreachDISC @ 11:30 am

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Follow the numbers in blue to understand each step.

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Source: Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware




 


 Subscribe in a reader

Tags: Jenkin flaw, Security vulnerability


May 07 2019

ICS-CERT warns of several flaws in the GE Communicator software

Category: Cyber CommunicationDISC @ 1:42 pm

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs.

Source: ICS-CERT warns of several flaws in the GE Communicator software




 Subscribe in a reader


May 06 2019

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Category: data security,GDPR,Security BreachDISC @ 9:29 pm

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online.

Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals



ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors



NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

 Subscribe in a reader


May 05 2019

Belgian programmer solves cryptographic puzzle

Category: CryptograghyDISC @ 2:35 pm

Belgian programmer solves cryptographic puzzle – 15 years too soon!

Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.

Source: Belgian programmer solves cryptographic puzzle – 15 years too soon!

 

 Subscribe in a reader

Tags: Cryptography, data encryption, encrypted


May 04 2019

Cyber Readiness Report 2019

Category: cyber security,Cyber WarDISC @ 7:32 pm

Cyber Readiness Report 2019 – By Hiscox



May 03 2019

Creating A Cyber Secure Home

Category: Information Security,IoT SecurityDISC @ 9:23 am

Creating A Cyber Secure Home – Infographic via SANS Institute

 Subscribe in a reader

Tags: cyber secure home, home security


May 01 2019

Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security

Category: Email SecurityDISC @ 12:51 pm

Organisations need to upgrade their email security

Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security measures and what needs to be done to improve the state of security in the public sector.

Source: Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security


Email Security with Cisco IronPort

Email Security Awareness




 Subscribe in a reader


Apr 30 2019

Facebook funds research on the impact of social media on elections

Category: Social networkDISC @ 3:11 pm

Impact of social media on elections

Facebook is going to fund academic research on the impact of social media on elections, aimed at preventing manipulation of these platforms.

Source: Facebook funds research on the impact of social media on elections


 Subscribe in a reader


Apr 29 2019

Tech Support Scammers Freeze Browsers Using Iframes

Category: Web SecurityDISC @ 12:37 pm

Tech Support Scammers Freeze Browsers Using Iframes

Tech support scammers are using iframes to lock web browsers and to trick people into calling their support hotlines posing as legitimate services to have their computers fixed after being presented with a “computer has been blocked” alert.

Source: Tech Support Scammers Freeze Browsers Using Iframes

 

The Browser Hacker’s Handbook



 Subscribe in a reader


Apr 25 2019

Computer security training courses

Category: Security Awareness,Security Tools,Security trainingDISC @ 11:18 am

Computer security training courses – Online cyber security courses

Build your cyber security awareness and InfoSec career to keep your cyber security skills relevant. Learn how to protect your information assets against today’s cyber threats with best online cyber security training courses.

 

DISC InfoSec cyber security training curriculum includes specialized InfoSec training and general cyber security courses for all levels.

 

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Linux Security and Hardening, The Practical Security Guide

Linux Security and Hardening, The Practical Security Guide

CISSP LiveLessons

CISSP LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons, 2nd Edition

Fundamentals of nerc cip

Fundamentals of nerc cip

Cyber Security – Online Scams & How to Avoid Them

Cyber Security - Online Scams & How to Avoid Them

Disaster Recovery and Risk Management

Disaster Recovery and Risk Management

 

 

Penetration Testing

Kali Linux

ISO27001

Python

CISSP

GDPR

Linux

Identity Theft

Powershell Security

Programming Courses

Security Risk Management

Planning a Security Incident Respose

AWS Security

Azure Security

Network Security

Wireless Security

RedHat Security

InfoSec eLearning

Social Engineering

Essentials of CyberSecurity

Azure Security & Compliance

Cyber Security Training Courses

Security Disaster Recovery

Cloud Security Computing 

 

 


 Subscribe in a reader

Tags: Chief security officer, information security awareness, information security guide, security awareness training


Apr 24 2019

Social Engineering Red Flags

Category: social engineeringDISC @ 10:02 pm

Social Engineering Red Flags




22 Social Engineering Red Flags

We recommend EVERYONE to review the 22 social engineering red flags to watch out for in any email. It might be a good idea to print out this PDF and pass it along to family, friends, and coworkers. Remember to always think before you click!



[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2019/04/22RedFlags.pdf”]




 Subscribe in a reader


Apr 23 2019

The best antivirus software of 2019

Category: AntivirusDISC @ 12:32 pm

The best antivirus software of 2019

Source: The best antivirus software of 2019


 Subscribe in a reader


« Previous PageNext Page »