Microsoft: Do these things now to protect your network | ZDNet


In its annual security intelligence report, Microsoft offers up its top tips for blocking out hackers.

Source: Microsoft: Do these things now to protect your network | ZDNet


Enter your email address:

Delivered by FeedBurner

Leave a Comment

Thunderclap flaws allow hacking most of modern computers

Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacks

Source: Thunderclap flaws allow hacking most of modern computers


Leave a Comment

Senators want Huawei equipment removed from US power grid because of security concerns

Huawei may well be causing excitement with its foldable smartphone, the Mate X, but the company’s troubles in the US continue. The American government has already banned the use of some Huawe…

Source: Senators want Huawei equipment removed from US power grid because of security concerns


Leave a Comment

Beef : The Browser Exploitation Framework Project

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.Amid growing concerns about web-borne

Source: Beef : The Browser Exploitation Framework Project


Leave a Comment

New browser attack lets hackers run bad code even after users leave a web page | ZDNet

MarioNet attack lets hackers create botnets from users’ browsers.

Source: New browser attack lets hackers run bad code even after users leave a web page | ZDNet


Leave a Comment

Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials

40.8% of smart homes have at least one device vulnerable to remote attacks, a third of them being vulnerable because of outdated software with unpatched security issues, while more than two-thirds are exposed by weak credentials.

Source: Smart Homes at Risk Due to Unpatched Vulnerabilities, Weak Credentials


Leave a Comment

Discovery of cameras built into airlines’ seats sparks privacy concerns

A viral tweet prompted closer scrutiny.

Source: Discovery of cameras built into airlines’ seats sparks privacy concerns

 

 


Leave a Comment

A Tale of Epic Extortions – How Cybercriminals Monetize Our Online Exposure

Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

Source: A Tale of Epic Extortions – How Cybercriminals Monetize Our Online Exposure


Leave a Comment

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy.

  • Source: A Deep Dive on the Recent Widespread DNS Hijacking Attacks

  • Leave a Comment

    Phishers’ new trick for bypassing email URL filters – Help Net Security

    Phishers have come up with another trick to make Office documents carrying malicious links undetectable by many e-mail security services.

    Source: Phishers’ new trick for bypassing email URL filters – Help Net Security


    Leave a Comment

    #TaxScam

    It’s tax season, and with it comes Tax Scams. Stay Cyber Aware and Cyber Safe.

    “Thousands of people have lost millions of dollars and their personal information to tax scams. Scammers use the regular mail, telephone, or email to set up individuals, businesses, payroll and tax professionals.

    The IRS doesn’t initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information. Recognize the telltale signs of a scam.” See also: How to know it’s really the IRS calling or knocking on your door

    TaxScam

     

     


    Leave a Comment

    Travel Back to 1990 With the Original World Wide Web Browser

    The World Wide Web turns 30 this year, and to celebrate three decades of utter chaos and brilliance, CERN developers and designers have created a version of the original WorldWideWeb browser that can run inside a modern browser. What, you wonder, is it like to surf the original web? Well, give it a try here. It’s kind of a pain!

    Source: Travel Back to 1990 With the Original World Wide Web Browser


    Leave a Comment

    Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July

    Microsoft announced on its support website that future Windows 7 and Windows Server 2008 updates will require SHA-2 code signing support to be installed starting with July 16, 2019.

    Source: Windows 7 and Server 2008 Updates to Require SHA-2 Support Starting July


    Leave a Comment

    Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks

    A researcher has discovered a serious vulnerability in Xiaomi electric scooters. Exploiting the flaw could allow remote attacks on it causing sudden breaks.

    Source: Vulnerability In Xiaomi Electric Scooters Could Allow Remote Attacks


    DISC InfoSec blog

    ↑ Grab this Headline Animator

    Leave a Comment

    3 data leaks that could be undermining your online privacy

    Protecting your online privacy is important. There has been a lot of discussion in recent years about how to stay safe online, and an increasing number of people are turning to Virtual Private Netw…

    Source: 3 data leaks that could be undermining your online privacy

    DISC InfoSec 🔒 securing the business 🔒  Data Security

     


    Leave a Comment

    Emotet Uses Camouflaged Malicious Macros to Avoid Antivirus Detection

    A new Emotet Trojan variant has been observed in the wild with the added ability to hide from anti-malware software by embedding malicious macros used to drop the main payload inside XML files disguised as Word documents.

    Source: Emotet Uses Camouflaged Malicious Macros to Avoid Antivirus Detection


    Leave a Comment

    Are Hackers Winning The Denial Of Service Wars?

    DDoS attacks may not be the quickest route to profitability for bad actors, but given the importance of this attack technique to nation-state cyberwar adversaries, we can expect continued innovation on the part of the hackers. Enterprises cannot afford to relax their efforts to combat such attacks.

    Source: Are Hackers Winning The Denial Of Service Wars?


    Leave a Comment

    Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts

    Dubsmash, Armor Games, 500px, Whitepages, ShareThis, and more said to be up for grabs for $$$s in BTC

    Source: Blue Monday in infosec: 620 million accounts across 16 hacked websites now for sale on dark web, seller boasts

    DISC InfoSec blog

    ↑ Grab this Headline Animator

    Leave a Comment

    ISO 27001 ISMS Documentation Toolkit Bolt-on

    Combine with the ISO 9001:2015 QMS Documentation Toolkit and/or the ISO 14001:2015 EMS Documentation Toolkit to create an ISO 27001- compliant integrated management system (IMS).

  • ISO 27001 ISMS Documentation Toolkit Bolt-on

  • DISC InfoSec blog

    ↑ Grab this Headline Animator


    Leave a Comment

    Security researchers discover new Linux backdoor named SpeakUp 

    SpeakUp backdoor trojan can run on six different Linux distributions, and even on macOS.

    Source: Security researchers discover new Linux backdoor named SpeakUp | ZDNet

    DISC InfoSec blog

    ↑ Grab this Headline Animator


    Leave a Comment