Threat Level: green Handler on Duty: Basil Alawi S.Taher

SANS ISC Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 days ago Judge throws antivirus patents back to Hell

The Register View Synopsis+1
Loss of two patents cripples case with Trend Micro, could slash Symantec payout

A US district court has torn the heart out of two patents wielded by Intellectual Ventures against two antivirus makers.

2 days ago Cybersecurity Law Is So Ridiculously Out Of Touch

Forbes View Synopsis+1
Cybersecurity legislation remains in a mess, with a mad dash to get it through risking serious problems.

2 days ago Pro tip: Three ways to gain (or prevent) admin access to OS X

TechRepublic View Synopsis+1
Jesus Vigo goes over three ways to recover admin access (or prevent unauthorized access) to OS X-based devices.

2 days ago The DHS brings its infantile, cyber-fantasy world to RSA 2015

ZDNet View Synopsis+1
OPINION: In his RSA 2015 keynote on national cybersecurity threats, Homeland Security head Jeh Johnson told an audience of cybsersecurity experts something so wildly impossible, it almost went unnoticed.

2 days ago RSA 2015: Keynote addresses online safety risks to increasingly connected youths

SC Magazine View Synopsis+1
Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.

Top News

21 hours ago Russian Hackers Read Obama Emails: Report

SecurityWeek View Synopsis+1

Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, The New York Times said Saturday.

18 hours ago Agile versus Architecture

IT Toolbox Blogs View Synopsis+1

Agile and Architecture seemed to be, rightly or wrongly, often discussed together today. Should Enterprise Architecture be Agile? This is the question we all ask in fact.

Let's go back to basics.

 

Agile is the developer's way to do more work with

4 hours ago Report: Unclassified e-mails from Obama to staff read by Russian hackers

ArsTechnica View Synopsis+1
Hackers didn't breach classified servers, but the close call chilled staffers.

1 day ago Why Groupon refused to pay a security researcher who discovered serious XSS bugs

Yahoo Security View Synopsis+1
It's very common these days for tech companies Google and Microsoft to offer hackers and security researchers big bucks if they're able to find security vulnerabilities that could pose serious threats to important software and services. Google in particular often hosts its own hacking competition where the search giant puts millions of dollars on the line for anyone savvy enough to skirt around Google's built-in security schemes. Recently, one security researcher found a number of high-level vulnerabilities on Groupon's website. Groupon promptly patched the security holes but, as it turns out, is refusing to pay him. Here's why. DON'T MISS: Google Maps trolls Apple in the most unbelievably inappropriate way A security researcher who goes by the name BruteLogic recently uncovered upwards of 32

1 day ago After Aaron's Law reintroduced, new counter-bill aims to crack down on hackers

ZDNet View Synopsis+1
When you don't differentiate between good and bad hackers, you have a problem.

1 day ago Big Oil Gazing at Alternative Energy, Utilities' IT-driven Efficiencies

Forbes View Synopsis+1
The oil price decline is prompting a rethink in terms of process efficiencies and adoption of IT services management across the energy spectrum, including the slower movers at big oil firms. Envision a centralized single IT platform combining the execution of tasks as diverse as scheduling of rig maintenance, deployment [...]

1 day ago Looking for laxatives, miss? Shoppers stalked via smartphone Wi-Fi

The Register View Synopsis+1
FTC tsks at startup promising an opt-out that was invisible to millions of citizens

The FTC has now settled with a New York startup that stealthily tracks the movements of Americans around stores using their smartphones' Wi-Fi signals.

Latest News

1 hour ago Better Passwords

IT Toolbox Blogs View Synopsis+1
Passwords are not the best method of authenticating users on a network, but they are the most commonly used method. They are easier and less expensive to implement and use than most of the alternatives, and are definitely better than no authenticatio...

2 hours ago Collaborate 15 #C15LV Preview: Business Process Transformation: ROI is Dead, Long Live ROA - Part Four: Business Process Transformation

IT Toolbox Blogs View Synopsis+1
When talking with CIOs, I like to ask key questions about their current state that have to do with the degree of control that they and the IT department has over business processes.

2 hours ago Barcode Scanning Equipment For Asset & Inventory Management

IT Toolbox Blogs View Synopsis+1
Barcode scanners vs QR code / smartphone combination vs mobile computers for inventory and asset management.