Stream

Join this community to post or comment

CIGTR.info

Security  - 
 
The President of the United States has presented his National Cybersecurity Plan which provides, among other things, the figure of a Federal Cybersecurity Chief. We'll talk about that, and about some stories not to sleep well from the other side: Tries to but Apple employees, manipulation of ...
1
Add a comment...
 
cause and effect in action
Executive orders create a structure for protecting data as part of $19 billion budget proposal
3
Ryein Goddard's profile photoADL Datacomm's profile photo
3 comments
 
It's all a front. He's just throwing his weight around grasping at straws in an effort to do something positive before the end of his term. It's sad that he needs to use executive orders to get anything done. I'd say that's clear evidence of the lack of trust.
Add a comment...
 
Revenge is a dish best served cold..
FBI to put major resources into finding culprits of Department of Justice hack, says former agent Leo Taddeo.
1
Add a comment...

Ryan Daws

Security  - 
 
Do you think GSMA’s security guidelines will help to enable secure IoT growth?
The GSMA, an official body which represents telecom companies, has published guidelines today which aim to ensure the secure deployment of IoT services and devices.
1
Add a comment...

HaK Tuts

Security  - 
 
T9000: An Advanced Modular Backdoor That Captures Encrypted Data, Take Screenshot & Record Conversation.
http://www.haktuts.in/2016/02/t9000-advanced-modular-backdoor-that-captures-encrypted-data-take-screenshot-and-record-conversation.html
Most custom backdoors used by advanced attackers have limited functionality. They evade detection by keeping their code simple and flying under the radar. But during a recent investigation we found a backdoor that takes a ver...
3
Add a comment...
1
1
Torgo Rosenberg's profile photo
Add a comment...
 
Are you secure? #IBM smart Buildings asks the questions you don't want.
1
Add a comment...
 
In a journal and FBI files shared as part of her Whitney Museum exhibit, Laura Poitras finally turns her lens of observation onto herself.
1
Add a comment...

Don Okereke

Security  - 
 
Sophisticated Malware – T9000 Backdoor Can Spy On Skype Users And Steal Their Files
http://goo.gl/4z6yYq

1
Add a comment...
 
10 rules you should follow before going for business meetings.#meeting #VMS http://bit.ly/1T5mnky

In a professional environment, it is not only important that the visitors are treated with utmost care, it also a good business practice for a visitor to come prepared so that he can gain a smooth entry into the premises.
1
Add a comment...
 
No Home Communist Network for the locals? Bummer...
The impacted websites include the North Korean airline, Air Koryo, and the country's state news agency.
2
1
Patrick Cockman's profile photo
Add a comment...
 
The Malware Museum is an online collection of a number of MS-DOS viruses from the 1980s and 1990s.

Remember when malware would just mess up your machine? Yeah. Good times.

http://bit.ly/1nSfx4O
Modern malware is designed to do things like steal your credit card information, enable identity theft, and even shut down nuclear power stations, and usually carries out its attacks silently and...
3
1
Roy Weischadle's profile photo
Add a comment...
 
 Tony Zafiropoulos ‏@fixvirus 57s57 seconds ago Ballwin, MO

Not Patching in Time Can Hurt http://oversitesentry.com/not-patching-in-time-can-hurt/#cybersecurity 29 SQL server versions EOL 4/12 #cybersecurity 
What do I mean by “In Time” ? it means that at some point. when a system has old code on it a new attack will have been developed by enterprising hackers both good and bad hackers. At that point your system is easily hacked, the more time you leave it unpatched the more likely you will get a ...
1
Add a comment...
 
Cool Spy Pen for security and hidden surveillance
4
Add a comment...
 
A security researcher from Google has revealed a vulnerability in a browser developed by antivirus company Avast. The browser is called Avastium, is also known as 'SafeZone' and built upon the open source browser Chromium.
1
1
Jaeson Kalmoni's profile photo
Add a comment...

David Bisson

Security  - 
 
Attackers have leveraged duplicate login credentials to compromise approximately 21 million accounts on Alibaba Group's Taobao ecommerce website.

via +Tripwire, Inc.
Attackers have leveraged duplicate login credentials to compromise approximately 21 million accounts on Alibaba Group's Taobao ecommerce website.
2
Add a comment...

Joe Pettit

Security  - 
 
Google announced on Wednesday plans to expand its Safe Browsing initiative aimed to protect users against social engineering attacks, such as deceptive online ads that install unwanted software or reveal personal information.

+Tripwire, Inc. 
Google announced on Wednesday plans to expand its Safe Browsing initiative aimed to protect users against social engineering attacks.
2
Add a comment...
 
Describing The Cyber Neigborhood http://oversitesentry.com/describing-the-cyber-neigborhood/#cybersecurity needs to know to prepare defense 
The Cyber Security Neigborhood Is it Safe? Link to a page at Fixvirus.com. The internet used to look like this in 1986: NSFNETimagefromslsc.org. And slowly but surely it became more complex(1991): internetasof1991slsc.org. So now that the globe is connected, what does the cyber neighborhood look ...
3
Add a comment...