Threat Level: green Handler on Duty: Guy Bruneau

SANS ISC: Information Security News - Internet Security | DShield Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Yet another way for criminals to screw us

IT Toolbox Blogs View Synopsis+1
Fraudsters Tap Kohl?s Cash for Cold Cash

2 days ago NYPD Used Stingrays over 1,000 Times Since 2008

SecurityWeek View Synopsis+1

Documents obtained by the New York Civil Liberties Union (NYCLU) this month show that the New York Police Department used stingrays more than 1,000 times since 2008 without warrants.

2 days ago When it comes to spaffing your login creds, Android biz apps are the business

The Register View Synopsis+1
300% better at it than non-business apps

Business apps for Android are three times more likely to leak login credentials than the average app, according to a new study by security firm NowSecure.

2 days ago BlackEnergy, KillDisk Infect Ukrainian Mining, Railway Systems

SecurityWeek View Synopsis+1

Researchers at security firm Trend Micro have found evidence suggesting that pieces of malware involved in the recent attacks against Ukraine's energy sector have been used to target other types of organizations as well.

2 days ago Skype users were targeted by bad-ad pushing Angler crooks

The Register View Synopsis+1
But fear not - the taint has now been purged

Cybercrooks have been caught running booby-trapped ads on Skype to redirect users towards an Angler exploit kit trap.

Top News

18 hours ago Checklist for Assessing a Disaster

IT Toolbox Blogs View Synopsis+1
The Business Continuity Plan needs to outline the steps and issues that ought to be considered when assessing the impact of a disaster. The Recovery Coordinator must be able to advise the Chief Executive and senior management teams on the impact of a...

7 hours ago The Original Hacker's Dictionary For Small Business Owners

Forbes View Synopsis+1
A cybersecurity book and glossary for newbies and small business owners.

1 day ago How to use secure shell from your Chromebook

TechRepublic View Synopsis+1
If you remotely administer Linux servers with the help of secure shell, grab the nearest Chromebook. Jack Wallen walks you through the steps of using ssh from Chrome OS.

1 day ago Teen Arrested in Britain Linked to Hack of US Spy Chiefs

SecurityWeek View Synopsis+1

British police said Friday they had arrested a teenager on hacking charges, as media reports said the youth was suspected of cracking the personal accounts of top US intelligence officials.

2 days ago Warning: Bug in Adobe Creative Cloud deletes Mac user data without warning

ArsTechnica View Synopsis+1
Adobe has stopped distribution of an update believed to be triggering the deletions.

1 day ago Friday Squid Blogging : Pajama Squid

Schneier blog View Synopsis+1

The Monterey Bay Aquarium has a pajama squid.

As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.

1 day ago Brit spies can legally hack PCs and phones, say Brit spies' overseers

The Register View Synopsis+1
So that's that, then

Blighty's spying nerve center GCHQ has a license to hack computers and devices at will, a UK intelligence oversight court has ruled.

Latest News

2 hours ago Moving from Mobility To Digital Workspaces With VMware's Workspace One

Forbes View Synopsis+1
Change, convergence, complexity and convenience. These are words that describe the technology landscape as businesses look to create digital enterprises. Digital transformation, while not new, is evolving. Every part of a business is changing as a result of the rise of mobile, cloud computing, big data and analytics. In the [...]

10 hours ago Third-party mainframe maintenance services

IT Toolbox Blogs View Synopsis+1
Colin Fettes from Azamour Solutions took a look at alternative ways to source and support your mainframe infrastructure and examines its impact on your bottom line in this year?s Arcati Mainframe Yearbook.