Threat Level: green Handler on Duty: Jim Clausing

SANS ISC: Information Security News - Internet Security | DShield Information Security News


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

2 hours ago Most hackers claim they can break target systems in under 12 hours

ZDNet View Synopsis+1
It also takes less than a day in total to finish the job and steal valuable data.

2 hours ago Hard Drive LED Allows Data Theft From Air-Gapped PCs

SecurityWeek View Synopsis+1

Researchers at Ben-Gurion University of the Negev in Israel have disclosed yet another method that can be used to exfiltrate data from air-gapped computers, and this time it involves the activity LED of hard disk drives (HDDs).

34 minutes ago At death's door for years, widely used SHA1 function is now dead

ArsTechnica View Synopsis+1
Algorithm underpinning Internet security falls to first-known collision attack.

9 hours ago Android Ransomware Demands Victims Speak Unlock Code

SecurityWeek View Synopsis+1

A newly discovered Android ransomware variant that packs speech recognition capabilities demands that victims speak a code provided by the attackers to unlock their devices, Symantec warns.

1 day ago Today's leading causes of DDoS attacks

ZDNet View Synopsis+1
Distributed denial of service attacks are growing ever bigger. Here's what's causing them.

Top News

6 hours ago Microsoft catches up to Valentine's Day Flash flaw massacre

The Register View Synopsis+1
Critical update deals with five ways to do remote code execution on Windows

Microsoft's popped out a Security Update for Adobe Flash.

4 hours ago Key SEO Considerations for Businesspeople in 2017

IT Toolbox Blogs View Synopsis+1
Making and applying the right SEO campaign has become a vital part of every single field of business. Due to the fact that there are billions of Internet users worldwide, many SME owners are forced to come up with witty strategies for improved online status.

3 hours ago RSA Conference 2017: Reporter's Visual Notebook

InfoRiskToday View Synopsis+1
The Greatest Cybersecurity Ever - Hype, Hope and Humor in San FranciscoEvery year, information security professionals flock to San Francisco for the annual RSA Conference. From the debut of "Trumpcryption" to cybersecurity's "greatest hits" set to hip-hop violin, here are some of the 2017 event's highlights.

1 hour ago Amazon Argues Alexa Has Free Speech Rights In Murder Trial Fight

Forbes View Synopsis+1
Amazon says Alexa's responses are protected by the First Amendment in its battle to protect Echo data from government overreach.

20 hours ago 5 easily installed utilities for improving your online privacy

TechRepublic View Synopsis+1
You can't go far in the world of tech news without running into a headline about data breaches or hacks. Shore up your defenses by installing these five apps.

20 hours ago OS X as a Forensic Platform

SANS Reading Room View Synopsis+1
The Apple Macintosh and its OS X operating system have seen increasing adoption by technical professionals, including digital forensic analysts. Forensic software support for OS X remains less mature than that of Windows or Linux. While many Linux forensic tools will work on OS X, instructions for how to configure the tool in OS X are often missing or confusing. OS X also lacks an integrated package management system for command line tools. Python, which serves as the basis for many open-source forensic tools, can be difficult to maintain and easy to misconfigure on OS X. Due to these challenges, many OS X users choose to run their forensic tools from Windows or Linux virtual machines. While this can be an effective and expedient solution, those users miss out on the much of the power of the Macintosh platform. This research will examine the process of configuring a native OS X forensic environment that includes many open-source forensic tools, including Bulk Extractor, Plaso, Rekall, Sleuthkit, Volatility, and Yara. This process includes choosing the correct hardware and software, configuring it properly, and overcoming some of the unique challenges of the OS X environment. A series of performance tests will help determine the optimal hardware and software configuration and examine the performance impact of virtualization options.

Latest News

50 minutes ago British Cops Bust Suspected German ISP Mirai Botnet Hacker

InfoRiskToday View Synopsis+1
1 Million Deutsche Telekom Routers Were Disrupted via Mirai MalwareAt the request of German authorities, British police have arrested a suspected hacker involved in last year's disruption of 1 million Deutsche Telekom customers' routers via Mirai malware, which targets default credentials on internet-connected devices.

50 minutes ago Amazon Argues Alexa Speech Protected By First Amendment In Murder Trial Fight

Forbes View Synopsis+1
Amazon says Alexa's responses are protected by the First Amendment in its battle to protect Echo data from government overreach.

50 minutes ago Deutsche Telekom hack suspect arrested at London airport

The Register View Synopsis+1
Cops probing Mirai telco takedown

UK police have arrested a suspect in connection with an attack that infected nearly 1 million Deutsche Telekom routers last November.

1 hour ago Cyberattacks threaten democracy itself, warns NATO

ZDNet View Synopsis+1
Society is at risk from hackers attempting to interfere in elections, argues NATO's Jamie Shea.

4 hours ago Netflix Releases Open Source Security Tool "Stethoscope"

SecurityWeek View Synopsis+1

Netflix this week released Stethoscope, an open source web application that gives users specific recommendations for securing their computers, smartphones and tablets.

7 hours ago Boffins exfiltrate data by blinking hard drives' LEDs

The Register View Synopsis+1
Malware? Check. Camera? Check. Let's go sniff passwords

That roll of tape you use to cover the Webcam? Better use some of it on your hard-drive LED, because it can be a data exfiltration vector.

7 hours ago Don't Get Tricked by Marketing

IT Toolbox Blogs View Synopsis+1

Every day in my email I get a bunch of junk mail.  Somehow it makes it past our spam filters.  Marketers, all of whom want "just 10 minutes of my time."  

 

Most of them are selling things that I don't have any responsibility for, or ability to purchase.  My favorite is the person(s) in Kansas who want to invite me to some even in Kansas City.  I don't

8 hours ago IoT Alliance Australia releases security guideline for IoT development

ZDNet View Synopsis+1
IoT Alliance Australia has released its IoT security guideline as a first step towards building industry-wide security standards.

9 hours ago Cyberwar talk is getting real

ZDNet View Synopsis+1
The existential threat of cyberwar has shifted from hand-waving about 'Cyber Pearl Harbor' to hand-waving about 'digital atomic bombs'. Hype? Maybe. Either way, politicians are talking tough.

10 hours ago Linux kernel gets patch for 11-year-old local-root-hole security bug

The Register View Synopsis+1
DCCP code cockup lay unnoticed since 2005

Eleven years ago or thereabouts, the Linux kernel got support for the Datagram Congestion Control Protocol - and also got a privilege escalation bug that has just been fixed.

11 hours ago Use CRM to Optimize Your Email Strategy

IT Toolbox Blogs View Synopsis+1

We may say we hate getting emails, but the research shows something quite different. We actually do read them and use them to make purchases. Email has the highest conversion rate (66 percent) of any marketing message type (social and direct mail) in moving prospects along the sales

11 hours ago 5 CRM Tips That Streamline Client Scheduling

IT Toolbox Blogs View Synopsis+1

Our busy lives require schedules, and schedules function better when they're organized efficiently. When running a business, your schedule has to make time for clients. By using customer relationship management (CRM) tools and features, you have the ability to create, customize, automate, and streamline client scheduling. Here, I show you five ways your CRM solution can help you streamline