Threat Level: green Handler on Duty: Brad Duncan

SANS ISC: Information Security News - Internet Security | DShield Information Security News

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

17 hours ago Ransomware halts production at Cadbury's Tasmanian chocolate factory

ZDNet View Synopsis+1
Chocolate production at Cadbury's factory in Hobart has been stopped by the latest global cyber attack.

17 hours ago Everything you need to know about the Petya, er, NotPetya nasty trashing PCs worldwide

The Register View Synopsis+1
This isn't ransomware - it's merry chaos

Analysis It is now increasingly clear that the global outbreak of a file-scrambling software nasty targeting Microsoft Windows PCs was designed not to line the pockets of criminals, but spread merry mayhem.

16 hours ago Qualcomm's New Fingerprint Sensors Go Through Metal, Glass And Displays

Forbes View Synopsis+1
Fingerprint sensors have become a mainstay among smartphone users to secure their devices and to pay for things. Between Apple and Samsung, fingerprint sensors have become one of the most commonly used features by consumers daily.

10 hours ago Massive Petya Variant Outbreak: More Clever Than WannaCry

InfoRiskToday View Synopsis+1
Rapidly Spreading Malware Has an Appetite For DestructionIs Petya worse than WannaCry? The second global outbreak of file-encrypting malware in as many months sees cyberattackers having designed potent, rapidly spreading malicious code far faster than organizations have been shoring up their defenses.

10 hours ago Six quick facts to know about the Petya global ransomware attack

ZDNet View Synopsis+1
This is what you need to know -- right now.

Top News

16 hours ago IGMP: Leaving a Host Group

IT Toolbox Blogs View Synopsis+1
As the final step of initialization, hginit calls hgjoin to place the host in the all-hosts group. Once a host has joined the all-hosts group, it will receive IGMP queries.

12 hours ago Akamai Launches New DNS Security Product

SecurityWeek View Synopsis+1

Content delivery network and cloud services provider Akamai announced on Tuesday the launch of a new product designed to protect enterprises against malware, phishing and data exfiltration attempts through the analysis of DNS requests.

9 hours ago Petya ransomware: Where it comes from and how to protect yourself

TechRepublic View Synopsis+1
The attack highlights the growing danger of compromised third-party software being used to spread malware throughout firms.

Latest News

5 hours ago UK's Metropolitan Police Still Using 10,000 Windows XP Computers

SecurityWeek View Synopsis+1

Legacy Windows XP systems used by public authorities in the UK remains a concern. The WannaCry outbreak last month followed by the current 'NotPetya' outbreak -- both using a vulnerability patched in newer versions of Windows, but initially unpatched in XP -- highlights the problem.

6 hours ago Windows 10 adds end-to-end security to the Fall Creators Update

TechRepublic View Synopsis+1
Microsoft is ramping up Windows 10 security features, using cloud intelligence to better detect and respond to attacks. Here's how it could help your enterprise.

6 hours ago 'Shadow Brokers' Threaten to Dox Former NSA Hacker

SecurityWeek View Synopsis+1

The Shadow Brokers has sent out its first round of exploits and data as part of a recently announced monthly subscription service, and the group claims it has a significant number of subscribers.

7 hours ago 123-reg resolves secure database access snafu

The Register View Synopsis+1
Catches up with https everywhere memo

UK-based hosting and domains provider firm 123-reg has fixed an issue that meant access to some customers' databases ran over an unsecured link, creating a privacy risk in the process.

29 minutes ago Virus (cough, cough, Petya) goes postal at FedEx, shares halted

The Register View Synopsis+1
TNT Express systems blown up by, er, yeah, you get the idea

FedEx has suspended trading of its shares on the New York stock exchange after admitting that its subsidiary TNT Express has been hit by "an information system virus."

29 minutes ago Global Cybersecurity Summit 2017: Are cybersecurity dollars being spent effectively?

TechRepublic View Synopsis+1
A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine discuss where to allocate the billions of dollars spent towards cybersecurity.

43 minutes ago Watchdog Agency: Many VA Security Weaknesses Persist

InfoRiskToday View Synopsis+1
Among the Concerns: Making Sure All Devices 'Authorized'A watchdog agency's annual security review of the Department of Veterans Affairs, the nation's largest healthcare provider, makes 33 recommendations for how the VA can address a variety of continuing vulnerabilities, but only three of them are new. What are the latest concerns?

59 minutes ago Dell EMC Wins ISC Supercomputer Conference Vendor Showdown Track 2

Forbes View Synopsis+1
For the past few years the International Supercomputing Conference (ISC) has held a vendor showdown. Last week, Dell EMC's Ed Turkel gave the winning presentation for the second of two tracks. This is significant praise from a very technical audience that expects both innovation and execution.

1 hour ago Time For Transportation & Logistics To Up Its Cybersecurity As Hackers Put It On Target List

Forbes View Synopsis+1
Transportation and logistics companies are on hackers' radar, based on the recent ransomware attacks that disrupted shipping and ports. The industry, a prime target because of its global, pan-industry nature and increased digitization, needs to make cybersecurity more of a priority moving forward.

2 hours ago Report: Facebook's Content Rules 'Favor Elites And Government' Over Activists, People Of Color

Forbes View Synopsis+1
A ProPublica investigation found that the site's methods for managing hate speech come down harder on minority groups than white posters of privilege.

2 hours ago 'Elsa' Tool Allows CIA to Locate Users via Wi-Fi

SecurityWeek View Synopsis+1

WikiLeaks has published a document detailing "Elsa," a tool allegedly used by the U.S. Central Intelligence Agency (CIA) to track people's locations via their laptop's Wi-Fi.

2 hours ago Most IoT devices are an attack waiting to happen, unless manufacturers update their kernels

TechRepublic View Synopsis+1
The security of IoT devices rests squarely on the shoulders of manufacturers. Jack Wallen explains and offers up the one solution that could go a long way to securing IoT.

3 hours ago Teardown of 'NotPetya' Malware: Here's What We Know

InfoRiskToday View Synopsis+1
Malicious Code Moves Laterally, Can Infect Fully Patched Windows PCsMalware known as NotPetya, SortaPetya or GoldenEye continues to spread globally, infecting endpoints via leaked Equation Group exploits as well as built-in Windows tools. Here's a roundup of what we know about the supposed ransomware and its spread so far.

4 hours ago Remote code execution flaws exposed in Kaspersky Server software

ZDNet View Synopsis+1
Core Security's advisory reveals a number of dangerous vulnerabilities in the antivirus server solution.

4 hours ago Petya ransomware attack: How many victims are there really?

ZDNet View Synopsis+1
A day on from from the initial reports of the ransomware attack, there are a number of different estimates of how many organisations have been infected.

5 hours ago When two worlds collide

IT Toolbox Blogs View Synopsis+1
If any changes you make could potentially result in raw sewage being spilled into the water supply, you tend to be very, very cautious about making changes.

5 hours ago SAP tools for forecasting

IT Toolbox Blogs View Synopsis+1
When the wheels fall off the forecast process it is usually because some process elements are not very mature or broken.

7 hours ago Petya: The poison behind the latest ransomware attack

ZDNet View Synopsis+1
Unpatched Windows machines are getting hammered again by a new ransomware attacker.