Stream

Join this community to post or comment
 
briankrebs (briankrebs)

Govt: Hackers spear-phished email marketing firms, stole a billion email addresses, and used firms' servers to spam http://t.co/Ut7H6mXepY

10:58 PM Mar 6th via Hootsuite
http://twitter.com/briankrebs/status/573935732546539520
U.S. federal prosecutors in Atlanta today unsealed indictments against two Vietnamese men and a Canadian citizen in connection with what's being called “one of the largest reported data breaches in U.S. history.” The government isn't naming the victims in this case, but all signs point to the ...
1
Add a comment...
 
On March 4, the series premiere for the new crime drama CSI: Cyber aired on CBS.

By David Bisson​ of +Tripwire, Inc.
On March 4, the series premiere for the new crime drama CSI: Cyber aired on CBS.
2
1
Joe C's profile photoAtharva Peshkar's profile photo
Joe C
+
1
2
1
 
I could not watch more than 2 minutes.
Add a comment...
 
Security Essentials is amongst the most popular Windows virus scanners but scores low on detection of malware that tries to steal money from bank accounts.
Security Essentials is amongst the most popular Windows virus scanners but scores low on detection of malware that tries to steal money from bank accounts.
4
4
Thiago Panda Bauer's profile photoDrêssa Johnston's profile photo
Add a comment...
 
I evaluate the United States’ International Strategy for Cyberspace (ISC 2011) and establish this document as our reference point looking ahead in our cyber strategy series. I then compare this document’s usage of the term “cyber” to U.S. NSS 2015.

By David Bisson​ of +Tripwire, Inc.
To be sure, the U.S. NSS 2015 takes a more nation- and security-centric approach than ISC 2011 with respect to its usage of the term “cyber.”
1
1
Thomas Brandtstaetter's profile photo
Add a comment...
 
Great download for IT professionals looking to beef up computer security at the office: http://bit.ly/18iav9J  [email required]
1
Add a comment...
 
Decade-old FREAK bug leaves Google and Apple device users vulnerable

https://gigaom.com/2015/03/03/decade-old-freak-bug-affects-google-and-apple-device-users/
A team of security researchers unearthed a decade-old vulnerability called the FREAK (Factoring attack on RSA-EXPORT Keys) attack, which impacts Google and Apple device users who may have visited websites, including Whitehouse.gov and NSA.gov, according to a Washington Post report. One of the researchers who spotted the vulnerability told the Post that “Of the 14…
5
2
jen hill's profile photoDennis Mix's profile photo
Add a comment...
 
A security firm has identified a new type of #malware that spams a mobile device’s contact list with SMS text messages touting fake Amazon gift card offers.

By David Bisson​ of +Tripwire, Inc.
2
2
open source report's profile photoBikz An's profile photo
Add a comment...
 
In major goof, Uber stored sensitive database key on public GitHub page
Ride-sharing service subpoenas GitHub for IP addresses that accessed security key.
2
Justin Gluck's profile photo
 
Dun goofed
Add a comment...
 
New Episode of the DDoS and Cybersecurity Power Talk Airing This Week

Time for another #hangout  to discuss all the latest and greatest in the worlds of #ddos  and #cybersecurity  with the +Black Lotus *DDoS and Cybersecurity Power Talk*.

This 10th episode of the #BLPowerTalk  will air Thursday, March 5 at 10:30 a.m PST/1:30 p.m. EST and will feature Dr. Danielle Zeedick, an #IT and #cyber security subject matter expert and professor. She currently works for a large Washington DC area defense contractor and provides consulting services to United States government agencies on cybersecurity education and training, big data concepts, and #data  science.

All-star host +Mia Voss will speak with +Dannee Zeedick about how the recent #netneutrality  vote will affect the web #security  landscape moving forward.

Please be sure to post any questions for Dr. Zeedick on the event page below and we will do our best to address them. We hope to see you there!

#ddosprotection   #ddosmitigation   #netneutrality2015   #hangoutsonair   #hangoutpost   #flt   #blacklotus  
 
DDoS and Cybersecurity Power Talk - Ep. 10 - Danielle Zeedick

The #BLPowerTalk  is a regularly occurring discussion presented by +Black Lotus and features some of the most important topics surrounding website #security . Useful to webmasters, #hosting  companies, and brands, this is a show full of practical takeaways and behind-the-scenes revelations from industry insiders that will keep you up-to-date and prepared to take on the latest threats in the #ddos  and #cybersecurity  landscapes.

Visit www.BlackLotus.Net for more details! 

The Event is set for Thursday, March 5 at 10:30 a.m. PST/1:30 p.m. EST.

This episode will feature Dr. Danielle Zeedick, an #IT  and #cyber  security subject matter expert and professor. She currently works for a large Washington DC area defense contractor and provides consulting services to United States government agencies on cybersecurity education and training, big data concepts, and data science. Dr. Zeedick also teaches information law and policy at The +George Washington University Colonials where she received both her master’s and doctoral degrees.

In this hangout,+Dannee Zeedick and our host +Mia Voss will be focusing the discussion on the recent #netneutrality  vote and how this will affect the cyber security and #ddosattacks  arenas moving forward.

Share this event page: http://gplus.ly/1JWpFTL

Watch Previous Episodes on+YouTube :
Episode 01: https://www.youtube.com/watch?v=aD7fzLr6aE4
Episode 02: https://www.youtube.com/watch?v=8V9OHReYaZo
Episode 03: https://www.youtube.com/watch?v=V_HN9x-DAA4
Episode 04: https://www.youtube.com/watch?v=wCF0uZXnLbs
Episode 05: https://www.youtube.com/watch?v=KvRWSGgANRw
Episode 06: https://www.youtube.com/watch?v=w3tUsIZXVls
Episode 07: https://www.youtube.com/watch?v=lh9rrDtp9Tg
Episode 08: https://www.youtube.com/watch?v=tGw330ljyBI
Episode 09: https://www.youtube.com/watch?v=2f2PrwWLBDM

Please Use the HashTag #BLPowerTalk  

Connect with Dr. Danielle Zeedick:
Web: http://datasociety.co/about-us/
Google+:+Dannee Zeedick 
Twitter:@SKWERLqueen

Connect with Black Lotus:
Black Lotus provides full service consultation for service providers and enterprises in the design and implementation of DDoS mitigation solutions.
Web: www.blacklotus.net
+Google+: +Black Lotus   
Facebook: https://www.facebook.com/ddosprotection
YouTube: http://www.youtube.com/user/ddosdefense
LinkedIn: https://www.linkedin.com/company/black-lotus-communications
Twitter: https://twitter.com/ddosprotection

Be Prepared: Download the Threat Report:
https://www.blacklotus.net/connect/ddos-threat-report
This Hangout On Air is hosted by Black Lotus. The live video broadcast will begin soon.
Q&A
Preview
Live
DDoS and Cybersecurity Power Talk - Ep. 10 - Danielle Zeedick
Yesterday, March 5, 1:30 PM
Hangouts On Air - Broadcast for free

15 comments on original post
1
Add a comment...
 
Malware detection in 2014 doubles from 2013 -- 2015 could be even worse
A report from PandaLabs suggests that there were twice as many malware infections in 2014 compared to 2013 -- and China was the hardest hit. Globally, Europe was found to be the area with the lowest rate of infection, and Sweden topped the chart as the safest country. The UK found itself in fourth place with an infection rate of 22.14 percent.
1
Add a comment...
 
Romanian antivirus company BitDefender warns for cybercriminals sending out emails with malicious help-files containing the Crypto Wall ransomware.
Romanian antivirus company BitDefender warns for cybercriminals sending out emails with malicious help-files containing the Crypto Wall ransomware.
3
2
Susan Luscombe's profile photoKrista M's profile photo
Add a comment...
 
The #Angler exploit kit is using a new method of evasion that allows it to compromise victims before information #security experts have a chance to respond.

By David Bisson​ of +Tripwire, Inc.
1
Add a comment...
 
A step-by-step account of an overnight digital heist
View original post
1
Add a comment...
 
A report explains how Google Play Book publishers that are offering cracked and modded Android APK files as part of fake game guides are exposing users to #malware and #phishing scams.

By David Bisson​ of +Tripwire, Inc.
1
1
Susan Luscombe's profile photo
Add a comment...
 
Data Security Is A 'Lifecycle' Commitment
Data security is one of those mission-critical issues people are always talking about and building solutions and policies around. But, even when we focus on the right problems, too many businesses are doing so at the wrong time – namely, after a breach has happened.   Determined hackers have proven again [...]
2
Add a comment...
 
 
It is bad enough when PC manufacturers add all kinds of crapware on a PC to make money as these programs tend to slow down the PC quite a bit as many of them come installed on it and may run on system start as well.
It takes time and effort to remove those. What Lenovo did however is a whole new level. Not only did it install Superfish on systems with injects advertisement when users browse the Internet, that freaking thing did install a root certificate on the system as well sharing its private key which makes your system vulnerable to man in the middle attacks.
I don't understand how a company, or its executives, can think for a moment that this is good business practice. Even if Lenovo did not know about the certificate, it should considering that it added the software to its systems and hopefully tested this before it went to production, it is bad enough but with the certificate, it could severely damage the companies reputation for years to come.
14 comments on original post
6
2
Jeffrey Hamby's profile photoJaeson Kalmoni's profile photoBikz An's profile photo
 
It's definitely removed me from their potential customers list. I haven't bought anything from Sony since their double rootkit either. 
Add a comment...
 
A security researcher has recently demonstrated an attack on Windows computers and Blu-ray players using a malicious Blu-ray disc.
A security researcher has recently demonstrated an attack on Windows computers and Blu-ray players using a malicious Blu-ray disc.
1
Add a comment...
 
According to a recent study, only 18 percent of retail IT security professionals are concerned that #cybercriminals are targeting point of sale (#PoS) devices installed on their networks, and only 20 percent are “confident” that those same devices are securely configured.

By David Bisson​ of +Tripwire, Inc.
1
Add a comment...
 
These cameras are overcoming the many problems with security and privacy caused by all other CCTV systems.
4
2
Viseum's profile photoStuart Thompson's profile photo
Add a comment...