Threat Level: green Handler on Duty: Basil Alawi S.Taher

SANS ISC InfoSec News Summary

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

4 days ago Victim of Tor-hidden revenge smut site sues Tor Project developers

The Register View Synopsis+1
But EFF lawyer says deep-web team 'no more liable' than web server makers

The Tor Project has found itself on the receiving end of a lawsuit claiming the software's developers aided the operators of a revenge porn site.

Top News

8 hours ago We SO DO support Java on XP, maybe even JDK 8, says Oracle

The Register View Synopsis+1
Or at least as much as Microsoft lets us

Oracle has issued a statement saying that it absolutely does support Java on Windows XP and may even decide to support JDK 8 on the orphan OS.

8 hours ago Bite of Mac - A Developer Moves to the Mac

IT Toolbox Blogs View Synopsis+1
In which a long time coder and twenty year Windows developer makes the move to the Mac platform. The whys, the hows, the pains and the pleasures of moving into the Light.

5 hours ago Insurers struggle to get grip on burgeoning cyber risk market

Yahoo Security View Synopsis+1

By Leigh Thomas and Jim Finkle PARIS/BOSTON (Reuters) - Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check. High profile cases of hackers seizing sensitive customer data from companies, such as U.S. retailer Target Corp or e-commerce company eBay Inc, have executives checking their insurance policies. Increasingly, corporate risk managers are seeing insurance against cyber crime as necessary budget spending rather than just nice to have. The insurance broking arm of Marsh & McLennan Companies estimates the U.S cyber insurance market was worth $1 billion last year in gross written premiums and could reach as much as $2 billion this year.

20 hours ago Attack Campaign Targets Facebook, Dropbox User Credentials

Dark Reading View Synopsis+1
The goal of the attackers is not fully clear but the credential theft could set up sophisticated targeted attackers.

20 hours ago Zberp evolves, spreads through phishing campaign

SC Magazine View Synopsis+1
Zberp malware was developed from the source code of Zeus and financial malware Carberp.

20 hours ago IoT creating plethora of new jobs in IT cybersecurity

TechRepublic View Synopsis+1
The complexity and sheer number of Internet of Things devices will require more IT security professionals, creating new job opportunities for those in the field.

20 hours ago Chinese businessman charged with hacking Boeing, Lockheed Martin

ArsTechnica View Synopsis+1
Stolen data allowed China to accelerate fighter tech development.

20 hours ago How to Teach Humans to Remember Really Complex Passwords

WIRED View Synopsis+1
If passwords are considered the bane of the data security industry, it's partly because humans are awful at choosing them: By some counts, we still pick "password" a facepalm-inducing one in 20 times. But a study from two researchers at Microsoft and Princeton suggests there's hope for those much-maligned secret strings of charters. Randomly generate […]

20 hours ago Google changing Chrome malware, phishing warnings

ZDNet View Synopsis+1
New designs for interstitial warning pages for malware and phishing sites detected by Google Safe Browsing are simpler.

20 hours ago Apple iPhone 'Threat to National Security': Chinese Media

SecurityWeek View Synopsis+1

BEIJING  - Chinese state broadcaster CCTV has accused US technology giant Apple of threatening national security through its iPhone's ability to track and time-stamp a user's location.

20 hours ago Report Of Unnamed Hedge Fund Breach Proves False

Forbes View Synopsis+1
While cybersecurity experts stress that the data breaches we hear about are only the tip of the iceberg, the financial sector can stop worrying about one specific cyber attack which was reported last month.  On Wednesday, the British security company BAE Systems revealed that the report the company gave in [...]

Latest News

16 minutes ago Be careful using hotel provided computers

IT Toolbox Blogs View Synopsis+1
You may be taking a big risk using a hotel provided computer. Criminals can compromise the computer with a keylogger that records all your transactions. This doesn?t affect using the hotel provided internet, although, you should be careful there,...

1 hour ago FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hacker

The Register View Synopsis+1
Accused of targeting F-22, F-35 and C-17 planes

A Chinese entrepreneur has been arrested for attempting to steal information on the United States' Lockheed F-22 and F-35 aircraft and Boeing's C-17 cargo plane.

2 hours ago Luke can now use the force, just not the force you think.

IT Toolbox Blogs View Synopsis+1

As a person who has grown up with StarWars I have always been fascinated with this mysterious force that everyone seems to have. Except the storm troopers, they could use some of that force to improve their aim.


I remember that I quite often tried to bring out the force in me and move things. Er, of course I was a child then, yes, I was a child. I'm not the adult you think

2 hours ago US military aircraft intel captured in alleged Chinese hacker raid

The Register View Synopsis+1
Boeing raided as accused Chinese businessmen targets F-22, F-35, and C-17 planes

A Chinese entrepreneur has been arrested for attempting to steal information on the United States' Lockheed F-22 and F-35 aircraft and Boeing's C-17 cargo plane.