Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Information Security News - SANS Internet Storm Center Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago iOS 11 'cop button': Shortcut disables your iPhone's Touch ID and calls SOS

ZDNet View Synopsis+1
Apple is offering a fast option to disable Touch ID in the next version of iOS.

23 hours ago What weighs 800kg and runs Windows XP? How to buy an ATM for fun and profit

The Register View Synopsis+1
Security researchers pick up angle grinder, drop £2k-plus in B-sides chat

B-sides Weighing in at 800kg secondhand, freestanding ATMs - a "safe with a computer on top" - are a logistical nightmare to own and research, security boffin Leigh-Anne Galloway warned delegates at the BSides Manchester infosec conference yesterday.

1 day ago US cops point at cell towers and say: Give us every phone number that's touched that mast

The Register View Synopsis+1
Verizon says basestation dumps increasingly popular

US telecoms giant Verizon says police are increasingly asking it to cough up massive dumps of cellphone data rather than individual records.

1 day ago New NIST draft embeds privacy into US govt security for the first time

The Register View Synopsis+1
Federal agency addresses the new world of Alexa, smart cameras and IoT

A draft of new IT security measures by the US National Institute of Standards and Technology (NIST) has for the first time pulled privacy into its core text as well as expanded its scope to include the internet of things and smart home technology.

1 day ago "‹Cloud is the ignored dimension of security: Cisco

ZDNet View Synopsis+1
A recent report from the networking giant has said cloud is the ignored dimension where enterprise security is concerned.

Top News

9 hours ago SCRUM vs. KanBan

IT Toolbox Blogs View Synopsis+1

I had an interesting conversation today with the Director of SW Engineering I work with.  He was relating some meetings he was in where various corporate IT leaders were discussing agile methodologies and how to standardize them across the company.

 

It seems that we have two flavors of what can loosely be called "agile" development going on.  The first type was being

7 hours ago Berkeley boffins build better spear-phishing black-box bruiser

The Register View Synopsis+1
Machine learning and code to detect and alert attempts to extract passwords from staff

Security researchers from UC Berkeley and the Lawrence Berkeley National Laboratory in the US have come up with a way to mitigate the risk of spear-phishing in corporate environments.

1 day ago Facebook Awards $100,000 Prize for Spear-Phishing Detection Method

SecurityWeek View Synopsis+1

Facebook announced on Thursday the winners of its 2017 Internet Defense Prize. A team of researchers from the University of California, Berkeley, and the Lawrence Berkeley National Laboratory earned the $100,000 prize for a novel technique of detecting credential spear-phishing attacks in enterprise environments.

1 day ago New Exploit Kit: A Closer Look

InfoRiskToday View Synopsis+1
The latest edition of the ISMG Security Report leads with a closer look at a new exploit kit and whether it represents a resurgence in these types of criminal packages. Also featured: a discussion of new vehicle security concerns and communications advice for CISOs.

1 day ago A Constant Threat: The Persistence Of The Email-Borne Cyberattack

Forbes View Synopsis+1
Cyberattacks continue to get more and more sophisticated, so it's critical that your business is aware of the characteristics of the most common email-based attacks.

22 hours ago A repair shop could completely hack your phone - and you wouldn't know it

ArsTechnica View Synopsis+1
Booby-trapped touchscreens can log passwords, install malicious apps, and more.

22 hours ago Microsoft cloud cybersecurity attacks up 300% in last year, report says

TechRepublic View Synopsis+1
In volume 22 of Microsoft's Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users.

Latest News

3 hours ago US DoD, Brit ISP BT reverse proxies can be abused to frisk internal systems - researcher

The Register View Synopsis+1
And how to avoid making the same mistakes

BSides Minor blunders in reverse web proxies can result in critical security vulnerabilities on internal networks, the infosec world was warned this week.

6 hours ago The LAN: A History of Network Operating Systems Part 2

IT Toolbox Blogs View Synopsis+1
Before proceeding further, a brief comment on the use of the terms "proprietary" and "open system" is probably in order.