Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail37.atl91.mcsv.net;

Posted on August 30, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]

So onto the news:

4 no-bull facts about Microsoft’s HTTP.sys vulnerability

The latest Web server vulnerability affects desktop systems as well as Microsoft products

1. The problem affects systems that aren’t servers or even running IIS

2. It’s easy to exploit

3. This variety of attack has been used on other Web servers

4. You can easily check if you’re vulnerable

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=14fe1c4974&e=20056c7556

Journalists should make ‘”digital hygiene a habit”

The UNESCO report, Building Digital Safety for Journalism, is a valuable resource for those who are struggling to keep up with these challenges. It calls on journalists and editors to develop a security plan that makes “digital hygiene” as common as brushing their teeth.

The report offers a number of recommendations to ensure that digital security is taken more seriously. These range from calling on news organizations and journalism institutions to provide regular digital security training for journalists. For example, reporters should know how to secure data on a laptop if it’s stolen or confiscated, and news outlets need to adopt secure technologies for all information and file-sharing.

Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=557852f6c1&e=20056c7556

Brits warming to biometric technology for online banking access

In a survey of 2,090 UK adults conducted by YouGov on behalf of credit reference agency Equifax it was found that nearly as many consumers would prefer fingerprint recognition (31%) to gain access to online banking as would prefer passwords (32%). Two banks in the UK, the Royal Bank of Scotland and NatWest, have already implemented fingerprint recognition technology for logins due to customer demand for the service.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=7cc80fd015&e=20056c7556

Infosec taking the strain as threats evolve and skills gap widens

Analyst forecasts of a 1.5 million shortfall of information security professionals by 2020 come amid reports of rising salaries, an ageing workforce and the inability to fill existing positions.

Organisations are increasingly struggling to manage threats, avoid errors and are taking longer to recover from cyber attacks, according to the 2015 (ISC)2 Global Information Security Workforce Study.

Frost & Sullivan estimates that the global workforce shortage will widen to 1.5 million in five years, while the variety and sophistication of cyber threats are expected to continue.

“The survey shows we are at an inflection point where it is probably going to get worse before it gets better, but we will not see that for at least a few more years,” he added.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c438e75856&e=20056c7556

DATA BREACH NOTIFICATION LEGISLATION MOVES FORWARD

The Data Security and Breach Notification Act of 2015, which was sponsored by Republican Rep. Marsha Blackburn and Democrat Peter Welch, was approved by the House Energy and Commerce Subcommittee on Trade in late March, and will now head to the full Energy and Commerce committee with amendments.

The bill requires that a business inform customers within 30 days if their data might have been stolen during a breach. The clock starts after the business has discovered the breach and conducted a good-faith investigation to determine if there’s a reasonable risk of identity theft, financial fraud or economic loss or harm, and restored the security of the breached systems.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=2537566977&e=20056c7556

Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says

The evidence from the Norse report, along with analyses by American intelligence agencies, strongly suggests that Iran has made much greater use of cyberweapons over the past year, despite international sanctions. The attacks have mostly involved espionage, but a few, like the Sands attack, have been for destructive purposes.

The report, and a similar one from Cylance, another cybersecurity firm, make clear that Iranian hackers are moving from ostentatious cyberattacks in which they deface websites or simply knock them offline to much quieter reconnaissance. In some cases, they appear to be probing for critical infrastructure systems that could provide opportunities for more dangerous and destructive attacks.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=bef4699377&e=20056c7556

Security pros name their must-have tools

Secure file sharing is imperative for Lawyers Without Borders, a group that works with volunteer lawyers to advance human rights law in conflict-ridden regions. The nonprofit organization, headquartered in Hartford, Conn., uses Intralinks VIA to protect confidential legal documents and court papers from unsanctioned access.

Two other IT pros who shared their favorite products also hail from the healthcare industry: Josh Bauer, assistant director of network operations at Acorda Therapeutics, and Derek Grocke, service delivery manager at HAMBS.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=2cff57804d&e=20056c7556

Incapsula Introduces New DDoS Downtime Calculator

Incapsula’s new DDoS Downtime Calculator is designed to help you assess the risks associated with an attack, offering case-specific information adjusted to the realities of your organization.

Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=543211e56d&e=20056c7556

PhishMe Unveils New Security Solution for Enhanced Visibility into Targeted Phishing Attacks

LEESBURG, Va., April 15, 2015 /PRNewswire-USNewswire/ — PhishMe® Inc., introduces PhishMe Triage, a new product offering that gives incident responders the analytics and visibility into email-based attacks occurring against their organizations in near real-time. The patent-pending technology, Triage, provides security operations center (SOC) analysts and incident responders insight into ongoing spear phishing attacks by automating the analysis and orchestrating the workflow associated with employee reported suspicious emails to reduce the detection deficit facing their enterprises. Triage is currently the only offering that leverages human intelligence inside the organization and turns conditioned employees, traditionally considered the weakest link, into the strongest detection asset for security operators.

Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=575cfd21f9&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=0fdd1fe013)

** Update subscription preferences (http://paulgdavis.us3.list-manage1.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme