Stream

Join this community to post or comment

Joe Pettit

General discussion  - 
 
Siemens, a leading producer of systems for power generation and transmission as well as medical diagnosis, has patched three vulnerabilities affecting a variety of SIMATIC HMI devices.

By +David Bisson of +Tripwire, Inc. 
Siemens has patched three vulnerabilities affecting a variety of SIMATIC HMI devices.
1
Add a comment...

Joe Pettit

General discussion  - 
 
A group of security researchers and law enforcement officials are threatening to launch a full investigation into the DDoS for Bitcoins (DD4BC) attack group if it continues to target banks.

By +Tripwire, Inc. 
Security researchers and law enforcement officials are threatening to launch a full investigation into DD4BC if it continues to target banks.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Rutgers University has hired three security firms to test its network for vulnerabilities following a series of targeted attacks during the 2014-2015 academic year.

By +David Bisson of +Tripwire, Inc. 
Rutgers has hired three security firms to test its network for vulnerabilities following a series of targeted attacks during the 2014-2015 academic year.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Target Corp. has reached an agreement with Visa Inc. to settle claims over the massive 2013 data breach that exposed 40 million credit and debit cards to fraud.

+Tripwire, Inc. 
Target Corp. has reached an agreement with Visa Inc. to settle claims over the massive 2013 data breach that exposed 40 million credit and debit cards.
1
Add a comment...

Dré W

Mobile security  - 
 
Create a free VyprVPN account with 500 MB of data usage. Encrypt your Internet connection and protect your online privacy.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Nine individuals have been charged by the United States Department of Justice (DOJ) with hacking into three separate newswires, stealing yet-to-be-published press releases, and passing this stolen information to approximately two dozen individuals who then traded on the bulletins before their public release.

By +David Bisson of +Tripwire, Inc. 
Nine individuals have been charged with hacking into three separate newswires and then passing stolen information to approximately two dozen rogue traders.
2
Bander Man's profile photo
 
"Don't steal, the government hates competition"
Add a comment...

Esther Levine

General discussion  - 
 
About 90% of the world’s firms are SMBs, meaning that they are the backbone of the global economy, and they are utilizing cloud services at increasing rates.
SMBs require easy-to-use Cloud applications customized to their needs for higher rates of cloud adoption.
1
1
Alexsander Antunes's profile photo
Add a comment...
 
Cloud Computers Can Be Attacked http://oversitesentry.com/?p=2605  #cybersecurity #testforsecurity SMB attacks can cause problems 
Of the 7 black hat white papers I want to focus on the ones that can cause problems for the Cloud Computers. The above diagram is a general diagram of the amount of companies servicing different IT sectors. Security can affect both Cloud and Virtualization.
3
1
Alexsander Antunes's profile photo
Add a comment...

Joe Pettit

General discussion  - 
 
Noise is a problem. As information security practitioners, we’ve been dealing with the problem of the signal-to-noise ratio for a long time. The solution hasn’t really changed, but the landscape certainly has. Ultimately, what drives noise down and elevates signal is, context.

+Tripwire, Inc. 
@MrTrav has released an open source framework for performing historical searches using attack signatures, TARDIS.
1
Add a comment...

Created by

About this community

The BrightTALK IT security community will cover breaking news in the industry and relevant topics like risk management, BYOD, malware and developing threats as well as mobile and application security. BrightTALK also tweets about IT security news and events from @InfoSecWebinars. Please post only relevant articles or resources!
San Francisco, NYC, London

Edcel Suyo

Mobile security  - 
 
Learn to develop secure codes for mobile apps. Get started for FREE here! FREE TRIAL of a hands-on mobile app security training course!  http://ow.ly/Rfynk
1
1
Alexsander Antunes's profile photo
Add a comment...

Andrew Rukin

Mobile security  - 
 
Hi,
I have created and put online a service for Android applications -> to Java decompilation: http://www.javadecompilers.com/apk/

Any input/comment/feedback would be highly appreciated!
Decompile Android Apk applications and extract Java source code and resources ✓ ONLINE ✓
1
Add a comment...

Sharon Solomon

Application security  - 
 
InfoSec ace Rafay Baloch analyzes today's leading Application Security solutions in this exclusive interview.
1
Add a comment...

Spinbackup Team

General discussion  - 
 
Beware! The latest news of cyber security industry is more than disturbing...
2
Walter Johnson's profile photoIron Bug's profile photo
2 comments
 
must be said in the header that this threat is related to Windows only.
Add a comment...

Randall Evans

General discussion  - 
 
Businesses must do a better job of educating consumers and employees about proper cyber-security precautions as a first line of defense against cyber-criminals.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Our security roundup series covers the week’s trending topics in the world of information security. In this compilation, we’ll let you know of the latest announcements, reports and controversies that the industry has been talking about recently.

+Tripwire, Inc. 
In our new security roundup series, we cover the week’s trending topics in the world of information security.
1
Add a comment...

Tony Zafiropoulos

General discussion  - 
 
Great DefCon23 Talks http://oversitesentry.com/?p=2622  #cybersecurity presentations: Wifi-IDS, Risk, SQLi 
Risk”vs.”Threat”vs.”Vulnerability. Risk”tends”to”be”bigger/more”general”than”threat.” Multiple”threats”can”role”up”in”to”a”single”risk. Threats”rely”on”vulnerabilities”to”be”realized. and more good risk info… to come. WiFi IDS/Firewall for windows: Vivek Ramachandran. wifiidsarchitecturediagram ...
1
1
Alexsander Antunes's profile photo
Add a comment...

Pete Herzog

General discussion  - 
 
As a matter of fact, “one virus found recently in the wild can change the voltage on your computer and electrocute you when you push the On button,” according to....
 
10201026 We need fear to sell security. We NEED it. If we didn’t make people scared of the threats, then cybersecurity as an industry would end. But what if we didn’t need it? The antiperspirant and deodorant industry doesn’t need to remind us that people can stink. We notice. And if you’re one of those people who thinks, “that’s crazy, people don’t stink and antiperspirant is based …
2
Add a comment...

Edcel Suyo

General discussion  - 
 
From XSS to Domain Admin. Watch a real-world network pentest. IT Security Researcher, Davide "GiRa" Girardi, tries to gain full access to an Active Directory Administrator Account. Access the full video here - http://ow.ly/PcdcK
1
3
Matthew Mueller's profile photoᏩ가을동화 (ᏌиequalᏩ)'s profile photo
Add a comment...