Threat Level: green Handler on Duty: Rick Wanner

SANS ISC: Information Security News - Internet Security | DShield Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

1 day ago Respiratory Therapist Convicted in HIPAA Criminal Case

InfoRiskToday View Synopsis+1
Prosecutors Alleged Patient Information Used to Seek DrugsIn a rare criminal case involving a HIPAA violation, a former respiratory therapist in Ohio has been convicted of wrongly obtaining individually identifiable protected health information.

1 day ago What Brexit Will Mean For International Data Sharing

Forbes View Synopsis+1
Post-Brexit, the UK will still have to abide by European data laws if it doesn't want trade to dry up.

1 day ago Brexit: What's Next for Privacy, Policing, Surveillance?

InfoRiskToday View Synopsis+1
As Britain Exits EU, the Legal Changes Will Be ImmenseBy a margin of 52 percent to 48 percent, British voters have decided to leave the European Union. But as Britain renegotiates its relationship with EU member states, its mass surveillance practices will likely face sharp scrutiny.

1 day ago GAO Audit: Agencies View Foreign Governments as Most Severe Cyberthreat (June 21, 2016)

SANS Newsbites View Synopsis+1

According to information gathered by the Government Accountability Office (GAO), the most frequent and most serious attacks against agency systems come from nation states.......

1 day ago Apple Fixes Flaw in AirPort Routers (June 21, 2016)

SANS Newsbites View Synopsis+1

Apple has released a firmware update for certain AirPort routers to address a DNS parsing flaw.......

Top News

1 hour ago Putting Together Your LAN Troubleshooting Toolkit

IT Toolbox Blogs View Synopsis+1
After seeing this smorgasbord of equipment available for helping you to test and troubleshoot your network, the next logical question is, "Which tools should I purchase for my network?" Here are some guidelines:

7 hours ago PunkeyPOS Impacts Millions via Infected Restaurants

SecurityWeek View Synopsis+1

During a recent investigation of Point of Sale terminals (PoS) in restaurants across the United States, PandaLabs researchers stumbled upon PunkeyPOS, a piece of malware designed to access credit card data.

1 day ago Look into our network, not around our network... you're under

The Register View Synopsis+1
Negev desert foxes aim to outwit hackers

Tactics successfully deployed by Field Marshal Bernard Law Montgomery against German Army officer Erwin Rommel in the battle of El Alamein have been applied in a cyber-technology that aims to outfox hackers.

1 day ago How to delete your OK Google Now audio search history

TechRepublic View Synopsis+1
If you're a Google Now power user, you might want to know that Google saves all of your audio searches. You might also want to know how to delete those searches from your account. Jack Wallen shows you how.

1 day ago DOJ's refusal to turn over code complicates child porn cases

Yahoo Security View Synopsis+1
SEATTLE (AP) - The Justice Department's refusal to disclose information about a software weakness it exploited during a major child pornography investigation last year is complicating some of its prosecutions arising from the bust.

1 day ago "Godless" apps, some found in Google Play, can root 90% of Android phones

ArsTechnica View Synopsis+1
Malware family packages a large number of exploits that give all-powerful root access.

Latest News

6 hours ago The CASE for Six Ancient Japanese Dog Breeds

IT Toolbox Blogs View Synopsis+1
I repeat myself, confronting the same issue, therefore I blog...

8 hours ago On This Date In Cyber Doom History: An Example of Getting It So Wrong For So Long

Forbes View Synopsis+1
I recently returned from presenting at this year's International Conference on Cyber Conflict in Tallinn, Estonia. In his presentation to a "Lessons Learned" panel at that conference, Jason Healey of Columbia University argued, "For twenty five years of the seventy five since Pearl Harbour, we have been talking about a [...]

9 hours ago Bitcoin transactions

IT Toolbox Blogs View Synopsis+1
Something that any user of bitcoins should be very well aware of is that if you lose your private key, you lose access to your bitcoins.

9 hours ago Four Qualities All Digital Enterprises Have In Common

Forbes View Synopsis+1
Photo: Joe McKendrick There are now a wealth of tools, technologies and platforms that can help even the most staid, hidebound organizations begin to make the journey to digital enterprise. However, becoming digital isn't just about technology, it's also about changing mindsets and breaking up calcified processes. For that, there isn't [...]

11 hours ago The one thing needed for AI

IT Toolbox Blogs View Synopsis+1

I think the boffins have got it all wrong! They are going about creating the singularity the wrong way. To make it even worse people, as in science fiction writers, have been telling them all along what needs to be done. Yet they either think they know better or have the wrong prescription glasses on.

 

From Asimov's stories to Number Five being alive, from Wall.E. to Cylon