Stream

Join this community to post or comment

Jeff Snyder

General discussion  - 
 
Cybersecurity Jobs Coming to SecurityRecruiter.com
1
Add a comment...
 
 
#malware   #android  
Godless, detected by Trend Micro as ANDROIDOS_GODLESS.HRX, is a malware family affecting Android smartphones and tablets that leverages rooting exploits to escalate its access to device administrator.
Researchres at Trendmicro have came across a family of mobile malware called Godless (detected as ANDROIDOS_GODLESS.HRX) that has a set of rooting exploits in its pockets. Godless, detected by Tren…
1
1
Grzegorz Strzelec's profile photo
Add a comment...

David Hanson

General discussion  - 
 
I have been a long-time fan of the #CISSP certification (which I, myself, decided to pursue years ago because I considered it to be valuable, and which I have now held for quite some time).
Learn why industry expert, Joseph Steinberg, recommends the CISSP certification.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Just as having a larger family inevitably results in more children forgotten at swim practice, the bigger your software project, the harder it becomes to find every bug, security vulnerability and logic flaw.

+Tripwire, Inc. 
What makes static code analysis tools different from other security tools is that they run while code is developed.
1
Iron Bug's profile photo
 
I think static analysis can help beginners with simple mistakes. actual problems of large software projects that may rise in runtime on real hardware are often difficult to find even for professionals.
Add a comment...

Scarlett Walker

Mobile security  - 
 
By taking care of these twelve small points, you'll be able to safeguard your privacy and reduce unwanted invasions in your life
Internet is a platform where millions of users share their data. Here are twelve things everybody should know about privacy on the Internet.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Users of popular online forums are being advised to change their passwords following the leak of some 45 million credentials.

By +Graham Cluley on +Tripwire, Inc. 
Users of popular online forums are being advised to change their passwords, following the leak of some 45 million credentials.
1
Add a comment...

Scarlett Walker

Mobile security  - 
 
researchers found that by using a micro USB cable and a computer, hackers can install third-party applications on the phone in just a matter of three minutes and can access the phone's most private data. Along with the private information, the device's name, serial number, manufacturer and device type is also disclosed to the laptop.
Your iPhone or Android Smartphone can be hacked when you charge it via your laptop, all under 3 minutes
1
Add a comment...

Nina Pineda

Application security  - 
 
Why Mitigation is the Best Remediation for a Company Data Breach #CyberSecurity
With news of company data breach circulating the internet for years, along with passwords and personal information posted online for sale without the company owners knowing it, IT security seems to be the wisest option for them.
1
Add a comment...

Joe Pettit

General discussion  - 
 
The global financial services firm Morgan Stanley has agreed to pay one million dollars for its failure to protect approximately 730,000 of its clients' information.

+MetaCompliance 
Securities and Exchange Commission (SEC) fine Morgan Stanley one million dollars for failure to protect clients' information.
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cybersecurity News for the Week of June 12, 2016
CYBERSECURITY NEWS FROM OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Identity Theft IRS Re-Enables ‘Get
Transcript’ Feature: The Internal Revenue Service has re-enabled a
service on its Web site that allows taxpayers to get a copy of their...
1
Add a comment...

Created by

About this community

The BrightTALK IT security community will cover breaking news in the industry and relevant topics like risk management, BYOD, malware and developing threats as well as mobile and application security. BrightTALK also tweets about IT security news and events from @InfoSecWebinars. Please post only relevant articles or resources!
San Francisco, NYC, London

Scarlett Walker

Mobile security  - 
 
Creator of the World Wide Web (WWW) recently said that the internet has fallen into the hands of governments and large corporations and has become the "world's largest surveillance network". Tim Berners-Lee explained in an interview that his invention has steadily come under the influence and control of powerful interests
The founder of the internet has spoken out against the modern practices followed by governments and large corporations to abuse his creation.
1
1
Grzegorz Strzelec's profile photo
Add a comment...

Scarlett Walker

Mobile security  - 
 
One weak link in the security chain could provide hackers with nearly limitless doorways that could potentially be unlocked and lead them to data. Bad news is that they've just been presented with at least four new vulnerabilities in the existing IoT systems.
Flaws in the Internet of Things’ security opens up new avenues for hackers. IoT vulnerabilities are being discovered each day. Protection is a must!
1
Iron Bug's profile photo
 
IoT is IoT. security is security. that two should never intersect, for goodness
Add a comment...

Sergey Gor (GreatSoftLine)

General discussion  - 
 
 
Data security is always a top priority for companies large and small. Be certain you have a policy and follow it as closely as you can if there is an incident. It will be a great help in the long run.
A compromise of your computer network is very often a confusing experience. Aside from the fact you can’t actually see where and how your property was tampered with or stolen, the possibility…
1
Add a comment...

Paweł Płocki

Application security  - 
 
My First 10 Minutes On a Server - Primer for Securing Ubuntu http://www.hackinsight.org/news,618.html
I check our logwatch email every morning and thoroughly enjoy watching several hundreds (sometimes 1000s) of attempts at gaining access with little prevail. (Many are rather unimaginative such as trying root with password 1234 over and over again). This general overview works for Debian/Ubuntu servers which are our personal favourite choice. These usually only serve as hosts for docker containers, but principles still apply. We'll go more in dept...
1
Add a comment...

Joe Pettit

General discussion  - 
 
Our story begins when Xu Jiaqiang, 29, decided to resign from his employer.

By +David Bisson of +Tripwire, Inc. 
A man has been charged with three counts of both economic espionage and theft of trade secrets after stealing source code from his former employer.
1
Add a comment...
 
 
#hacking   #security  
After purchasing, criminal hackers can use the servers to send spam, steal data and perform other nefarious acts while avoiding any real ties to the originating server. Once done, the hackers can then re-list the server for sale on the same marketplace.
An online black market known as xDedic has a catalog of over 70,000 compromised servers, according to Kaspersky Lab. The servers are in 173 countries and belong to businesses, universities and even…
1
Iron Bug's profile photoSergey Gor (GreatSoftLine)'s profile photo
2 comments
 
In the end, money trumps all and the fact that xDedic makes these servers available even to criminals with relatively intermediary skills for less than $10 in some cases is a win for the buyer.
Add a comment...

Pedro Putu Wirya

General discussion  - 
 
ICS Engineering and Cyber Security Courses
For I&C and IT security professionals that live in ASEAN, especially in Indonesia, below is the upcoming schedule for ICS engineering and cyber security courses:
http://fedco.co.id/icseccs
1
Add a comment...

Scarlett Walker

Mobile security  - 
 
Fortunately, users are not left to fend for themselves and can rely on several tools to improve their online privacy and security without breaking a sweat. For starters, they can ensure their anonymity with the help of VPN services and so on. However, before you can focus on how to effectively protect yourself online, it will be a good idea to discuss said online security myths; here are a few to get you started.

#OnlineSecurityMyths
When we talk about social media & other digital platforms, we barely pay attention to online security & how it is the most overlooked part of the internet.
1
Add a comment...

Joe Pettit

General discussion  - 
 
In a previous article, we discussed building a deeper understanding of distributed denial-of-service (DDoS) attacks, what they do, who’s behind them, and what they all come down to. To follow, here’s how to prepare your website for DDoS attack.

+Tripwire, Inc. 
In a previous article, we discussed building a deeper understanding of DDoS attacks. Here’s how to prepare your website for DDoS attack.
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cybersecurity Vulnerability and Patch Report for June 12, 2016
CYBERSECURITY
VULNERABILITY AND
PATCH REPORT FROM
OUR FRIENDS AT   CITADEL
INFORMATION GROUP Important Security
Updates Google Chrome: Google has released Google Chrome version 51.0.2704.84 to
address multiple vulnerabilities. Updates are available from wit...
1
Add a comment...