Mar 09 2019

Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7

Category: Information Security,Security patchingDISC @ 11:54 am

Hot on the heels of disclosing a critical zero-day vulnerability in Chrome that was being exploited in the wild by attackers, Google has now uncovered another critical zero-day that is being used alongside it to take over Windows machines.

Source: Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7



Mar 07 2019

How to choose the right cybersecurity framework

Does your organization need NIST, CSC, ISO, or FAIR frameworks? Here’s how to start making sense of security frameworks.

Source: How to choose the right cybersecurity framework



Mar 06 2019

Firefox to add Tor Browser anti-fingerprinting technique called letterboxing | ZDNet

Category: Web SecurityDISC @ 11:59 am

Firefox gets another new feature from the Tor Uplift project started in 2016.

Source: Firefox to add Tor Browser anti-fingerprinting technique called letterboxing | ZDNet


Enter your email address:

Delivered by FeedBurner


Mar 05 2019

Comcast security nightmare: default ‘0000’ PIN on everybody’s account

Category: Information SecurityDISC @ 10:29 am

It didn’t require an account PIN to switch carriers. Everybody uses 0000, it said, making it easier for customers… and phone hijackers.

Source: Comcast security nightmare: default ‘0000’ PIN on everybody’s account

  • Best Practice Information Security
  • Enter your email address:

    Delivered by FeedBurner


    Mar 04 2019

    Probably the best-selling ISO27001 Toolkit in the world

    Category: ISO 27kDISC @ 2:11 pm

    IT Governance Ltd, the world’s one-stop shop for ISO27001 information, books, toolkits, training and consultancy for ISO27001 Information Security Management, has now sold 1,034 copies of its ISO27001 ISMS Documentation Toolkit.

    “We estimate that between 5% and 10% of all ISO27001-certified organisations worldwide have drawn on the comprehensive, best practice templates contained in our ISO27001 Toolkit,” commented Alan Calder, CEO of IT Governance.

  • The ISO27001 Documentation Toolkit
  • ISO 27001 Implementation

  • Enter your email address:

    Delivered by FeedBurner


    Mar 04 2019

    RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions | Threatpost

    Category: CISSP,cyber security,InfoSec jobsDISC @ 10:14 am

    The workforce and skills gap in cybersecurity continues to plague organizations.

    Source: RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions | Threatpost

  • InfoSec Jobs
  • InfoSec Certs
  • Enter your email address:

    Delivered by FeedBurner


    Mar 03 2019

    ISO27002 2013 ISMS Controls Gap Analysis Tool (Download)

    Category: ISO 27kDISC @ 10:28 pm

    ISO27002: 2013 compliant! This tool has a very specific, high-level purpose in any ISMS project, which is to quickly and clearly identify the controls and control areas in which an organization does not conform to the requirements of the standard.

    Use this self-assessment tool to quickly and clearly identify the extent to which your organization has implemented the controls and addressed the control objectives in ISO 27002.

    Special offer: Get two gap analysis tools for the price of one!

    Complete your gap analysis with the ISO 27002:2013 ISMS Controls Gap Analysis Tool.

    Buy the ISO 27001:2013 ISMS Gap Analysis Tool and get this tool for free!

    Use the following code at the checkout when you buy the ISO 27001:2013 ISMS Gap Analysis Tool and the ISO 27002:2013 ISMS Controls Gap Analysis Tool will automatically be added to your shopping cart: B1G1GAP*



    Mar 03 2019

    Hacking with BeEf – Stealing Social Media Credentials

    Category: Hacking,Web SecurityDISC @ 11:28 am

    BeEF [Browser Exploitation Framework] is a penetration testing tool which focuses strongly on the web browsers. BeEF passes the hardened network perimeters.

    Source: Hacking with BeEf – Stealing Social Media Credentials


    Enter your email address:

    Delivered by FeedBurner


    Mar 02 2019

    Cyber Defense Magazine – March 2019 has arrived. Enjoy it!

    Category: cyber securityDISC @ 11:49 am

    Cyber Defense Magazine October 2018 Edition has arrived. MARCH 2019 EDITION (RSA CONFERENCE PRINT EDITION & E-MAG COMING NEXT WEEK)

    Source: Cyber Defense Magazine – March 2019 has arrived. Enjoy it!


    Enter your email address:

    Delivered by FeedBurner

    Tags: cyber defense, cyber hacking


    Mar 01 2019

    How to set up a VPN

    Category: VPNDISC @ 4:02 pm

    Make sure you can surf safely

    In a nutshell, a VPN establishes a secure, encrypted connection between your device and a private server, hiding your traffic from being seen by others. Of course, the VPN itself can still see your traffic, which is why you should choose a VPN from a company you trust. (A good rule of thumb is to avoid free VPNs, because if they’re not charging you a fee, they may be monetizing in some less desirable way.) In addition, law enforcement can get its hands on your information through the VPN company. However, for the most part, a VPN offers you a way to hide your online activity from others.

    Source: How to set up a VPN

     

  • NordVPN apps for iOS and macOS
  • How to connect your phone to a VPN


  • Enter your email address:

    Delivered by FeedBurner


    Mar 01 2019

    Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*

    Category: Hacking,Security patchingDISC @ 3:18 pm

    RV110W, RV130W, RV215W need patching to close remote hijacking bug

    Source: Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*


    Enter your email address:

    Delivered by FeedBurner


    Mar 01 2019

    What is a botnet? And why they aren’t going away anytime soon

    Category: BotnetDISC @ 11:23 am

    A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations.

    Source: What is a botnet? And why they aren’t going away anytime soon


    Enter your email address:

    Delivered by FeedBurner


    Feb 28 2019

    Cisco WebEx Meetings affected by a new elevation of privilege flaw

    Category: App SecurityDISC @ 2:10 pm

    A vulnerability in the update service of the Cisco Webex Meetings Desktop App for Windows could allow elevation of privilege

    Source: Cisco WebEx Meetings affected by a new elevation of privilege flaw


    Enter your email address:

    Delivered by FeedBurner


    Feb 28 2019

    Microsoft: Do these things now to protect your network | ZDNet

    Category: Information SecurityDISC @ 10:08 am


    In its annual security intelligence report, Microsoft offers up its top tips for blocking out hackers.

    Source: Microsoft: Do these things now to protect your network | ZDNet


    Enter your email address:

    Delivered by FeedBurner


    Feb 27 2019

    Thunderclap flaws allow hacking most of modern computers

    Category: HackingDISC @ 12:41 pm

    Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacks

    Source: Thunderclap flaws allow hacking most of modern computers



    Feb 26 2019

    Senators want Huawei equipment removed from US power grid because of security concerns

    Category: Cyber War,HackingDISC @ 12:21 pm

    Huawei may well be causing excitement with its foldable smartphone, the Mate X, but the company’s troubles in the US continue. The American government has already banned the use of some Huawe…

    Source: Senators want Huawei equipment removed from US power grid because of security concerns



    Feb 26 2019

    Beef : The Browser Exploitation Framework Project

    Category: Hacking,Web SecurityDISC @ 12:02 pm

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne

    Source: Beef : The Browser Exploitation Framework Project



    Feb 25 2019

    New browser attack lets hackers run bad code even after users leave a web page | ZDNet

    Category: Web SecurityDISC @ 6:37 pm

    MarioNet attack lets hackers create botnets from users’ browsers.

    Source: New browser attack lets hackers run bad code even after users leave a web page | ZDNet



    Feb 25 2019

    Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials

    Category: IoT SecurityDISC @ 5:16 pm

    40.8% of smart homes have at least one device vulnerable to remote attacks, a third of them being vulnerable because of outdated software with unpatched security issues, while more than two-thirds are exposed by weak credentials.

    Source: Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials



    Feb 22 2019

    Discovery of cameras built into airlines’ seats sparks privacy concerns

    Category: Information PrivacyDISC @ 10:50 am

    A viral tweet prompted closer scrutiny.

    Source: Discovery of cameras built into airlines’ seats sparks privacy concerns

     

     


    Tags: PHI, PII, privacy concerns


    « Previous PageNext Page »