May 15 2019

Virus Removal Tool

Category: AntivirusDISC @ 10:30 pm

Virus Removal Tool

Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.

Source: Sophos Virus Removal Tool


 Subscribe in a reader

Tags: Free antivirus, Virus Removal Tool


May 14 2019

California is bringing law and order to big data. It could change the internet in the U.S.

Category: Information PrivacyDISC @ 9:59 am

   ⚖️ California is bringing law and order to big data ⚖️

California Expands Consumer Privacy Protections | The California Consumer Privacy Act, or CCPA, gives residents of California the ability to request the data that businesses collect on them, demand that it be deleted, and opt out of having that data sold to third parties, among other things.

The state’s attorney general wants to avoid a troubled rollout, à la Obamacare, when the far-reaching restrictions on user data go into effect on Jan. 1.

Source: California is bringing law and order to big data. It could change the internet in the U.S.

here’s the no paywall copy of the article… https://archive.fo/NmU9E


 Subscribe in a reader

Tags: California Consumer Privacy Act, CCPA


May 13 2019

Most popular programming languages on stack overflow

Category: App Security,PythonDISC @ 4:26 pm

Most popular programming languages


 Subscribe in a reader


May 12 2019

Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark

Category: HackingDISC @ 9:09 pm

The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.

Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark


 Subscribe in a reader


May 09 2019

7 Types of Experiences Every Security Pro Should Have

Category: CISO,InfoSec jobsDISC @ 2:25 pm

As the saying goes, experience is the best teacher. It’ll also make you a better and more well-rounded security pro.

Source: 7 Types of Experiences Every Security Pro Should Have

 Subscribe in a reader


May 09 2019

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Category: Security BreachDISC @ 11:30 am

Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Follow the numbers in blue to understand each step.

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper

Source: Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware




 


 Subscribe in a reader

Tags: Jenkin flaw, Security vulnerability


May 07 2019

ICS-CERT warns of several flaws in the GE Communicator software

Category: Cyber CommunicationDISC @ 1:42 pm

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs.

Source: ICS-CERT warns of several flaws in the GE Communicator software




 Subscribe in a reader


May 06 2019

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Category: data security,GDPR,Security BreachDISC @ 9:29 pm

Unsecured SkyMed Database Exposed PII Data Of 137K Individuals

Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online.

Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals



ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors



NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)

 Subscribe in a reader


May 05 2019

Belgian programmer solves cryptographic puzzle

Category: CryptograghyDISC @ 2:35 pm

Belgian programmer solves cryptographic puzzle – 15 years too soon!

Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.

Source: Belgian programmer solves cryptographic puzzle – 15 years too soon!

 

 Subscribe in a reader

Tags: Cryptography, data encryption, encrypted


May 04 2019

Cyber Readiness Report 2019

Category: cyber security,Cyber WarDISC @ 7:32 pm

Cyber Readiness Report 2019 – By Hiscox



May 03 2019

Creating A Cyber Secure Home

Category: Information Security,IoT SecurityDISC @ 9:23 am

Creating A Cyber Secure Home – Infographic via SANS Institute

 Subscribe in a reader

Tags: cyber secure home, home security


May 01 2019

Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security

Category: Email SecurityDISC @ 12:51 pm

Organisations need to upgrade their email security

Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security measures and what needs to be done to improve the state of security in the public sector.

Source: Lagging behind: why government organisations need to upgrade their email security -TEISS® : Cracking Cyber Security


Email Security with Cisco IronPort

Email Security Awareness




 Subscribe in a reader


Apr 30 2019

Facebook funds research on the impact of social media on elections

Category: Social networkDISC @ 3:11 pm

Impact of social media on elections

Facebook is going to fund academic research on the impact of social media on elections, aimed at preventing manipulation of these platforms.

Source: Facebook funds research on the impact of social media on elections


 Subscribe in a reader


Apr 29 2019

Tech Support Scammers Freeze Browsers Using Iframes

Category: Web SecurityDISC @ 12:37 pm

Tech Support Scammers Freeze Browsers Using Iframes

Tech support scammers are using iframes to lock web browsers and to trick people into calling their support hotlines posing as legitimate services to have their computers fixed after being presented with a “computer has been blocked” alert.

Source: Tech Support Scammers Freeze Browsers Using Iframes

 

The Browser Hacker’s Handbook



 Subscribe in a reader


Apr 25 2019

Computer security training courses

Category: Security Awareness,Security Tools,Security trainingDISC @ 11:18 am

Computer security training courses – Online cyber security courses

Build your cyber security awareness and InfoSec career to keep your cyber security skills relevant. Learn how to protect your information assets against today’s cyber threats with best online cyber security training courses.

 

DISC InfoSec cyber security training curriculum includes specialized InfoSec training and general cyber security courses for all levels.

 

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Security Penetration Testing (The Art of Hacking Series) LiveLessons

Linux Security and Hardening, The Practical Security Guide

Linux Security and Hardening, The Practical Security Guide

CISSP LiveLessons

CISSP LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons

Red Hat Certified Engineer (RHCE) with Virtual Machines LiveLessons, 2nd Edition

Fundamentals of nerc cip

Fundamentals of nerc cip

Cyber Security – Online Scams & How to Avoid Them

Cyber Security - Online Scams & How to Avoid Them

Disaster Recovery and Risk Management

Disaster Recovery and Risk Management

 

 

Penetration Testing

Kali Linux

ISO27001

Python

CISSP

GDPR

Linux

Identity Theft

Powershell Security

Programming Courses

Security Risk Management

Planning a Security Incident Respose

AWS Security

Azure Security

Network Security

Wireless Security

RedHat Security

InfoSec eLearning

Social Engineering

Essentials of CyberSecurity

Azure Security & Compliance

Cyber Security Training Courses

Security Disaster Recovery

Cloud Security Computing 

 

 


 Subscribe in a reader

Tags: Chief security officer, information security awareness, information security guide, security awareness training


Apr 24 2019

Social Engineering Red Flags

Category: social engineeringDISC @ 10:02 pm

Social Engineering Red Flags




22 Social Engineering Red Flags

We recommend EVERYONE to review the 22 social engineering red flags to watch out for in any email. It might be a good idea to print out this PDF and pass it along to family, friends, and coworkers. Remember to always think before you click!



[pdf-embedder url=”https://blog.deurainfosec.com/wp-content/uploads/2019/04/22RedFlags.pdf”]




 Subscribe in a reader


Apr 23 2019

The best antivirus software of 2019

Category: AntivirusDISC @ 12:32 pm

The best antivirus software of 2019

Source: The best antivirus software of 2019


 Subscribe in a reader


Apr 23 2019

Ten Must-Have CISO Skills

Category: CISODISC @ 10:23 am

Source: Ten Must-Have CISO Skills – By Darren Death

  • Recommended titles for CISO
  • CISO’s Library
  • CISOs and the Quest for Cybersecurity Metrics Fit for Business
  •  

     

    CISO should have answers to these questions before meeting with the senior management.

    • What are the top risks
    • Do we have inventory of critical InfoSec assets
    • What leading InfoSec standards and regulations apply to us
    • Are we conducting InfoSec risk assessment
    • Do we have risk treatment register
    • Are we testing controls, including DR/BCP plans
    • How do we measure compliance with security controls
    • Do we have data breach response plan
    • How often we conduct InfoSec awareness
    • Do we need or have enough cyber insurance
    • Is security budget appropriate to current threats
    •  Do we have visibility to critical network/systems
    • Are vendor risks part of our risk register


     Subscribe in a reader


    Apr 21 2019

    Stuxnet Malware Analysis

    Category: MalwareDISC @ 6:15 pm

    Stuxnet Malware Analysis By Amr Thabet


     Subscribe in a reader

    Tags: advanced malware, Advanced persistent threat, Stuxnet


    Apr 20 2019

    Every Linux Networking Tool

    Category: Network security,Security ToolsDISC @ 4:31 pm

    Every Linux Networking Tool – By Julia Evans

    No alt text provided for this image


     Subscribe in a reader

    Tags: Hacker (computer security), Linux Networking Tool, Network tools, security tools


    « Previous PageNext Page »