Threat Level: green Handler on Duty: Rick Wanner

SANS ISC Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

15 hours ago These are all the crazy things you can hire a hacker to do for you

Yahoo Security View Synopsis+1

Ever wanted to get access to your spouse's Facebook account without them knowing? Are you looking to order some shady products from the "deep web?" Interested in clearing your record, or improving your grades? There's a hacker for that, or at least a site where you can list such requests and appropriate rewards, hoping that hackers will be interested in helping out. FROM EARLIER: How to hire a hacker Needless to say that such activities aren't necessarily ethical and/or moral, but Hacker's List is filled with various requests for hacker services, and the service became more appealing to regular Internet users, Ars Technica reports, after being profiled in The New York Times a few days ago. In what follows, you can

13 hours ago The mainframe is alive and well and thriving in Poughkeepsie

IT Toolbox Blogs View Synopsis+1
(Posted Saturday, January 31, 2015) On January 14, 2015, we announced our latest processor (server?) to the world.   The IBM z Systems z13.  (You can find a few additional details about this announcement in my January 14 blog post ? "The IBM z13 is announced today; ...

1 day ago BMW fixes security flaw in its in-car software

Yahoo Security View Synopsis+1

German luxury carmaker BMW has fixed a security flaw that could have allowed hackers to unlock the doors of up to 2.2 million Rolls-Royce, Mini and BMW vehicles, it said on Friday. BMW said officials at German motorist association ADAC had identified the problem, which affected cars equipped with the company's ConnectedDrive software using on-board SIM cards -- the chips used to identify authorized users of mobile devices. BMW drivers can use the software and SIM cards to activate door locking mechanisms, as well as a range of other services including real-time traffic information, online entertainment and air conditioning. The security risk occurred when data was transmitted, BMW said, adding it did not impede the car's critical functions of driving, steering or braking.

Top News

8 hours ago Writing software in the real world - 20

IT Toolbox Blogs View Synopsis+1
One of the essential elements of agile development is keeping in touch with the client, and more particularly with the end user.

4 hours ago Topface Facepalms As It Surrenders To Data Breach Hacker Blackmail

Forbes View Synopsis+1
This evening while I was pursuing my news feed I stumbled onto an interesting story about a data breach earlier this week. A large Russian dating site called Topface was compromised in a data breach and their user base was exposed. An attacker going by the rather unimaginative moniker, "Mastermind" [...]

4 hours ago Hackers Compromise Business IM Service HipChat

SecurityWeek View Synopsis+1

Malicious actors have managed to compromise servers powering HipChat, the business-focused group chat and instant message (IM) service.

According to a security notice posted by HipChat's Craig Davies on Saturday night, hackers were able to breach the firm's defenses and access names, usernames, email addresses, and encrypted passwords small percentage of its customers.

22 hours ago Super-cookie crumbles: Verizon will kill off HATED zombie stalkers

The Register View Synopsis+1
This time opt-out actually means opt-out, we're told

Verizon has backed down over its fingerprinting of subscribers using so-called immortal "super cookies."

1 day ago Outlook for iOS app "breaks" corporate security, developer says

ZDNet View Synopsis+1
The worst part? Microsoft will take (and store) your email account credentials in its cloud if you use the app, released this week.

1 day ago Brazil: The Global Fraud Test Kitchen

InfoRiskToday View Synopsis+1
IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.

1 day ago xHamster malvertising campaign exploits Adobe zero-day

SC Magazine View Synopsis+1
The number of infections for a malvertising campaign originating on an adult website rose by 1500 percent in a two-day period.

1 day ago FTC Publishes Report on Security and Privacy for Internet of Things (January 27 & 28, 2015)

SANS Newsbites View Synopsis+1

The US Federal Trade Commission (FTC) has published a report to address security for the Internet of Things (IoT).......

1 day ago Co3 Systems Is Expanding into Europe

Schneier blog View Synopsis+1

This was supposed to be a secret until the middle of February, but we've been found out.

We already have European customers; this is our European office.

And, by the way, we're hiring, primarily in the Boston area.

1 day ago Critical Ghost bug could haunt WordPress and PHP apps, too

ArsTechnica View Synopsis+1
The list of potential ways to exploit Ghost has grown to include Web mainstays.

Latest News

2 hours ago Overcoming 31 consecutive days of failure

IT Toolbox Blogs View Synopsis+1

No one likes to fail. I don't know anyone who likes to fail repeatedly.  I know I don't.  But that's what I've just experienced.  31 consecutive days of failure!


Surprisingly, it doesn't feel like the end of the world.  I feel like I'm ready to bounce back.  I've got a plan and I know I can execute it.  Not it just remains to

3 hours ago How To Become An American Sniper

Forbes View Synopsis+1
I fully realize that there are many of you who find the notion of a sniper morally offensive. Many of you not only opposed the Iraq War, but also oppose all war. Nevertheless, being a military sniper is a legitimate, if physically and psychologically demanding, occupation. So, if you feel this is a career option about which you are passionate, here are the things that you need to know to become an effective military sniper, if not necessarily the next Chris Kyle, the deadliest sniper in U.S. history.

7 hours ago How would Pete Carroll and Bill Belichick's Leadership Styles Help Your IT Balanced Scorecard?

IT Toolbox Blogs View Synopsis+1
Can we learn to be better CIOs by examining the Super Bowl coaches leadership styles against the IT Balanced Scorecard? For those familiar with the IT Balanced Scorecard, it provides a framework for evaluating strategic performance of an IT Department. It looks at metrics for Corporate Contribution, Customer or User Orientation, Operational Excellence, and Future Orientation.