Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: Information Security News - Internet Security | DShield Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago This is the dishwasher with an unsecured web server we deserve

ZDNet View Synopsis+1
Why wouldn't you want to have your restaurant's dishwasher hooked onto the internet at large?

15 hours ago USA can afford golf for Trump. Can't afford .com for FBI infosec service

The Register View Synopsis+1
So guess what spoofers are doing with the fake site? Yup - getting dupes to log in is supposed to be on of the United States' defences against online criminals. But the FBI-led service is currently the subject of a typosquatting and email attack that could see organisations seeking protection instead send their personal data straight to parties unknown.

15 hours ago JobLink Breach Affects Job Seekers in 10 States

SecurityWeek View Synopsis+1

America's JobLink (AJL), a multi-state online service that connects job seekers with employers, informed users last week that a malicious hacker breached the company's systems.

14 hours ago Apple Updates iTunes to Patch SQLite, Expat Flaws

SecurityWeek View Synopsis+1

Apple updated the Windows and Mac versions of iTunes last week to address more than a dozen vulnerabilities affecting the Expat and SQLite libraries.

13 hours ago U.K. Calls For Backdoor To WhatsApp After London Attacks

Forbes View Synopsis+1
The government's defense secretarysaid WhatsApp must not be a 'place for terroriststo hide,' putting renewed pressure on Facebook's most popular messaging service.

Top News

33 minutes ago Ease off on the security certifications and focus on these things instead

IT Toolbox Blogs View Synopsis+1

Are you thinking of getting an IT information security-related certification? Perhaps you want to go for Security+, Certified Ethical Hacker (CEH), or, assuming you have the required experience, the CISSP? These certifications not only look good on your resume but, the best part to me, is that you learn some great material along the way. These certifications are valuable and will, no doubt, benefit

3 minutes ago How to fix disappearing iPhone passwords

ZDNet View Synopsis+1
Once you've changed your Apple/iCloud password you may find it keeps disappearing from your iPhone, iPad, or iPod Touch. Here's how to bring it back for good.

9 hours ago Businesses beware: Smartphone malware rises 400% in 2016, Nokia reports

TechRepublic View Synopsis+1
Android smartphones and Internet of Things devices are increasingly at risk of attack, according to a new Nokia report. Here's how to keep your business safe.

8 hours ago Doxed by Microsoft's Users unwittingly shared sensitive docs publicly

ArsTechnica View Synopsis+1
Microsoft pulled search bar from site after security researchers raised red flags.

Latest News

7 hours ago Ex-military and security firms oppose Home Sec in WhatsApp crypto row

The Register View Synopsis+1
'We are in real trouble if we apply blunt weapons to this'

UK government ministers calling for increased surveillance abilities in the wake of last Wednesday's terrorist attack have encountered opposition from a somewhat unexpected quarter.

7 hours ago A Great Reason To Update Your iPhone: This Hack Breaks iOS Security With Just A Wi-Fi Connection

Forbes View Synopsis+1
Hack could own an iPhone by just having it connect to Wi-Fi, but Apple has fixed it.

1 hour ago 5 Ways the LinkedIn Acquisition Could Hobble Microsoft CRM Dynamics

IT Toolbox Blogs View Synopsis+1

Some in the customer relationship management (CRM) industry saw Microsoft's 2016 acquisition of LinkedIn as a huge win for Microsoft Dynamics CRM. Gaining data on more than 467 million

2 hours ago FYI users: You may have leaked passwords, personal info - thousands have

The Register View Synopsis+1
Just call it

Thousands of netizens inadvertently shared passwords and other highly private information with the rest of the planet - via Microsoft's publicly searchable service.

2 hours ago FYI Office 365 subs: You may have leaked your passwords, personal info on - thousands already have

The Register View Synopsis+1
Just call it

Thousands of Office 365 subscribers inadvertently shared passwords and other highly private information with the rest of the planet - via Microsoft's publicly searchable service.

4 hours ago Texas Specialty Practice Suffers Ransomware Attack

InfoRiskToday View Synopsis+1
Urology Austin Says it Mitigated Attack, But Reports Large BreachA ransomware attack on a Texas urology practice that potentially affects nearly 280,000 patients ranks as one of the largest health data breaches reported to federal regulators this year.

4 hours ago Botnet Pummels Retail Websites in Hunt for Gift Card Balances

SecurityWeek View Synopsis+1

Malicious Bot Checked More Than 4 Million Gift Card Numbers Per Hour in Search of Active Cards With Balances

A recently discovered Internet bot is conducting sustained attacks against retailers and checking millions of gift card numbers to determine if any have balances, Distil Networks researchers warn.

4 hours ago "‹Microsoft pulls then revives search after complaints of exposed sensitive files

ZDNet View Synopsis+1
Security experts pointed to numerous sensitive and personal files found on Microsoft's document sharing site, which lets users share documents publicly by default.

4 hours ago Beyond Translation: Transcreation and the Transformation of ERP

IT Toolbox Blogs View Synopsis+1

As more people across the globe gain access to online resources, the business world is hurrying to meet their needs. Some of this involves translating existing services, marketing materials and sales copy into different languages, without changing the meaning of the information.

But many businesses are changing their localization model away from translation and toward transcreation.

5 hours ago How Do Service Companies Use Customer-Generated IoT Data?

IT Toolbox Blogs View Synopsis+1

The Internet of Things (IoT) is about "things." How these "things" are used in service businesses varies widely, and companies don't often think of it when they examine their service delivery processes. In many service companies, "things" tend to be of less importance than customer service, on-time performance, quality metrics, and so on.


5 hours ago Apple pushes security update to OS X Yosemite and El Capitan

ZDNet View Synopsis+1
Apple has a surprise for OS X Yosemite and El Capitan users -- a security update.

6 hours ago Let's Encrypt Issues 15,000 Fraudulent "PayPal" Certificates Used for Cybercrime

SecurityWeek View Synopsis+1

Free and open Certificate Authority (CA) Let's Encrypt has issued nearly 15,000 certificates containing the term "PayPal" for phishing sites to date, a security researcher has discovered.

7 hours ago FBI Warns Healthcare Industry of FTP Attacks

SecurityWeek View Synopsis+1

The Cyber Division of the U.S. Federal Bureau of Investigation (FBI) has issued an alert to warn the healthcare industry that malicious actors are actively targeting File Transfer Protocol (FTP) servers that allow anonymous access.

8 hours ago SecureMyEmail is email encryption for everyone

TechRepublic View Synopsis+1
If you're looking for the simplest route to email encryption, SecureMyEmail might be the answer.

9 hours ago Passwords: Workers say they will hand them over for next to nothing

ZDNet View Synopsis+1
One in seven employees would risk a data breach for a small amount of money.

10 hours ago New Relic's CIO: Digital Transformation Makes CIO Role More Important

Forbes View Synopsis+1
Yvonne Wassenaar has gone from being a partner at Accenture, to IT executive positions at VMware to CIO of digital intelligence platform company, New Relic. Her combination of strong business and technical acumen has also allowed her to join the boards of multiple companies.