Security blogs

Distribuir contenido
Some security blogs I followCNXriv2VjbgCfgont2013-07-01T21:55:27Z
Actualizado: hace 8 años 5 semanas

Ponemon Survey: Majority Of Organizations Committed To Risk-Based Security Management

Mar, 06/25/2013 - 16:56
Protection of intellectual property a key business objectives for 88 percent of respondents(author unknown)
Categorías: Bundle Security blogs

World of Warcraft mobile auctions closed after rash of account hijacks

Mar, 06/25/2013 - 15:50

World of Warcraft publisher Blizzard has temporarily closed mobile access to its online auction house following reports that hackers were using it to scam users out of large amounts of digital gold.

"There's been a recent increase in unauthorized World of Warcraft account-logins via our website and the World of Warcraft mobile armory app," Blizzard officials warned in a blog post published Tuesday morning. The company is in the process of notifying users who show signs of account compromise and who didn't use a two-factor "authenticator" to help secure connections. Those users will receive instructions for resetting their accounts and be eligible to have their raided gold restored.

The temporary closure comes three days after reports surfaced that unauthorized purchases were being made against user accounts at highly inflated prices. "The items purchased were two brawler white quality items and a white quality level 1 axe," one WoW player wrote here. "I have an authenticator and a relatively difficult password. What could have happened, and what recourse do I have? Will I ever see my gold again?" The items purchased were a brawler's vest for 135,423g, a worn battleaxe for 53,142g, and brawler's pants for 19,660g.

Read 2 remaining paragraphs | Comments

Categorías: Bundle Security blogs

Small To Midsize Businesses Continue Migration To Cloud-Based Business Applications

Mar, 06/25/2013 - 15:29
Dropbox, Google Apps, Citrix GoToMeeting and Evernote top list of employee favorites(author unknown)
Categorías: Bundle Security blogs

Biometric Authentication Provides Better Mobile Device Security, Heavy Reading Finds

Mar, 06/25/2013 - 15:27
Drive behind biometric authentication on smartphones will occur from both the consumer and enterprise, report says(author unknown)
Categorías: Bundle Security blogs

Centrify And Dropbox Partner To Enable Secure Access For Dropbox For Business

Mar, 06/25/2013 - 15:24
Centrify Cloud Service simplifies the deployment of federated identity for Dropbox SSO(author unknown)
Categorías: Bundle Security blogs

Dell Offers Secure Commercial PCs With New Encryption, Advanced Authentication, And Malware Protection Solutions

Mar, 06/25/2013 - 15:21
Encryption protects data at the file level(author unknown)
Categorías: Bundle Security blogs

DeepSec Proceedings: The Book – Call for Papers Reminder

Mar, 06/25/2013 - 10:51
Dear DeepSec speakers this goes out to you: It’s our pleasure to inform you that we will publish a book as proceedings about past and present DeepSec topics. A summary, a factual overview on what’s been going on at our annual event, from 2008 – 2012, a collection of the most compelling talks and captivating [...]sanna
Categorías: Bundle Security blogs

Timeless elegance: DeepSec T-Shirts 2011

Mar, 06/25/2013 - 09:52
Somewhere it’s still 2011. In another dimension it’s probably always Monday. ANYWAY — for those of you who want to wear a garment of timeless elegance we have the very T-Shirt: DeepSec T-Shirt 2011 proudly presented by our favourite model, Mme Cyberduck.     Wow, look at this imprint   – neat, isn’t it? T- Shirt can be [...]sanna
Categorías: Bundle Security blogs

US warns countries against helping Snowden

Lun, 06/24/2013 - 23:52

The United States is directing threatening language at countries which don't do what they're told when it comes to handing over former spy agency contractor Edward Snowden, who is on the run after leaking details of PRISM to the media.

Tags: USPRISMLaw and Orderl33tdawg
Categorías: Bundle Security blogs

Phishing attacks surge with 87 percent growth over last year, warns Kaspersky

Lun, 06/24/2013 - 23:51

Researchers at Kaspersky Lab have reported significant growth in phishing attacks over the last year.

In a study entitled "The Evolution of Phishing Attacks", Kaspersky said it found 37.3 million out of its 50 million customers running its security products that were at risk of being phished from 2012 to the present, an 87 percent increase over the same period between 2011 and 2012.

Tags: PhishingIndustry Newsl33tdawg
Categorías: Bundle Security blogs

Microsoft-Oracle deal: What you need to know

Lun, 06/24/2013 - 22:06

Microsoft and Oracle announced a lot of piece parts with their June 24 partnership around Azure and Oracle databases and middleware.

Here's your Cliff Notes version: Oracle apps are now certified to run on Windows Server, Hyper-V, and Windows Azure. Up until today, they were only certified to run on Windows Server. Oracle Linux also gets added to the list of Linux varianst supported in Azure's VMs, too.

Tags: MicrosoftOracleIndustry Newsl33tdawg
Categorías: Bundle Security blogs

Pentagon's failed flash drive ban policy: A lesson for every CIO

Lun, 06/24/2013 - 22:05

The Pentagon has granted many exceptions, possibly numbering in the thousands, to allow staff members who administer secure computer networks to use flash drives and other portable storage devices, department spokesmen say. [...] But officials say waivers go to people who update software and run helpdesk services for the Pentagon's vast computer network and are needed to run the system efficiently.

Yeah, that's a thing, apparently.

Tags: HardwareSecurityl33tdawg
Categorías: Bundle Security blogs

Testy U.S. officials demand return of NSA document leaker Snowden

Lun, 06/24/2013 - 21:50

U.S. officials Monday testily asked the Russian government to expel fugitive document leaker Edward Snowden, who arrived there Sunday after spending several days in hiding in Hong Kong.

In a statement, the White House National Security Council blasted government officials in China and Hong Kong for permitting Snowden to leave despite an official U.S. request to detain him.

Tags: NSAPRISMLaw and Orderl33tdawg
Categorías: Bundle Security blogs

Integralis Launches Single Global Brand, WideAngle,and Announces Plan To Change Name To NTT Com Security

Lun, 06/24/2013 - 21:29
WideAngle will provide customers with a holistic approach to information security and risk management(author unknown)
Categorías: Bundle Security blogs

Patricia Titus Joins CyberUnited's Board

Lun, 06/24/2013 - 21:27
Most recently, she served as vice president and chief information security officer at Symantec(author unknown)
Categorías: Bundle Security blogs

BYOD: Many Call It Bring Your Own Malware (BYOM)

Lun, 06/24/2013 - 19:02
It is not new that people are referring to Bring Your Own Device (BYOD) as Bring Your Own Malware (BYOM). [...]Omar Santos
Categorías: Bundle Security blogs

Raspberry Pi bot tracks hacker posts to vacuum up passwords and more

Lun, 06/24/2013 - 18:40
Mark H. Evans

Password and credit-card details leak online every day. So no one really knows just how much personally identifiable information is available by clicking on the right link to Pastebin, Pastie, or similar sites. Using a platform that runs on the hobbyist Raspberry Pi platform to drink from this fire hose, a security researcher has cataloged more than 3,000 such posts in less than three months while adding scores more each week.

Dumpmon, as the project is called, is a bot that monitors Twitter messages for Web links containing account credentials, sensitive account information, and other "interesting" content. Since its debut on April 3, it has captured more than 3,300 records containing 1.1 million addresses, most of which are accompanied by the plaintext or cryptographic hash of an associated password. The project has also unearthed social security and driver license numbers, credit card data, and other information that could be used to hijack user accounts or commit identity theft. On average, Dumpmon collects 51 such posts each day.

"It was mainly trying to determine how much information is being hidden from plain view and finding out how much information can be found just by looking in the right place," said Jordan Wright, a security engineer for CoNetrix. (Wright created the Dumpmon as an independent side project.) "It's pretty incredible. I wasn't expecting as much information as I found. I was expecting a lot less for sure."

Read 10 remaining paragraphs | Comments

Categorías: Bundle Security blogs

Risk I/O Adds Real-Time Attack Data To Vulnerability Intelligence Platform

Lun, 06/24/2013 - 17:53
Latest version correlates real-time attack data against a company's vulnerabilities to help identify where they are most likely to be attacked(author unknown)
Categorías: Bundle Security blogs

Bayshore Networks Announces Technology Partnership With SecurView

Lun, 06/24/2013 - 17:02
SecurView will work closely with Bayshore to serve large enterprise, government, and critical infrastructure customers(author unknown)
Categorías: Bundle Security blogs

New Barracuda Web Filter Models Feature 10 GbE Interfaces

Lun, 06/24/2013 - 16:47
New models feature increased performance and capacity to offer comprehensive Web content filtering and malware protection at multigigabit speeds(author unknown)
Categorías: Bundle Security blogs