Stream

Join this community to post or comment

MyIT Web Design

General discussion  - 
 
How to Export and Import passwords in Chrome browser http://www.thewindowsclub.com/export-import-passwords-chrome-browser
You can easily export and import passwords in Chrome browser by tweaking a flag setting. Learn more about how to manage the passwords saved in Chrome.
3
4
Add a comment...

Pankaj Sharma

General discussion  - 
 
A nice time to go for a Udemy course! Take any course for just $10.  Offer valid till 30th of August 2016
#Udemy #UdemyCourses #UdemyDiscountOffer  
Almost all Udemy courses with this offer are made available for the learners at just $10. The offer is valid till 30th of August 2016. Go register people!
1
Add a comment...
 
Here’s everything you need to know about protecting yourself from said hackers
1
Add a comment...

Sergey Gor (GreatSoftLine)

Threats and malware  - 
 
 
#security  
Even though the internet creates some risks of which you should be aware, it still offers more benefits than dangers. The key is to take steps to protect yourself from being compromised
Technology is a great resource that has added a new level of convenience and automation to our daily lives. Technology allows us to have access to most any information instantaneously. It al…
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cyber Security News of the Week, August 21, 2016
CYBERSECURITY NEWS FROM OUR FRIENDS AT   CITADEL INFORMATION GROUP Individuals at Risk Identity Theft SocialSecurity
Admin backtracks on txt msg requirement for e-acct: The U.S. Social
Security Administration says it is reversing a newly enacted policy that...
1
Add a comment...

Joe Pettit

General discussion  - 
 
Incorporating security activities into the natural workflow of productive tasks makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee that you’ll be able to solve a particular security-usability issue. The reason for this is that such problems can be categorised as wicked.

+Tripwire, Inc. 
One cannot apply traditional methods to solving a wicked problem in information security; a creative solution must be sought instead.
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Security Staff Shortages Incur Higher Breach Recovery Costs
New study measures the financial impact of a breach on a company short on IT security staff.
2
1
Add a comment...

Jennifer Hudson

Mobile security  - 
 
Elliot's plan to hack the FBI illustrates how a similar attack could be carried out in real life. Read more to learn the complete story.
2
Add a comment...
 
 
#android  

AV-Test Laboratory published the results of testing the level of protection and ease of use 26 mobile antivirus software on Android 5.1.1 platform (6846 malware samples), held in July 2016.
AV-Test Laboratory published the results of testing the level of protection and ease of use 26 mobile antivirus software on Android 5.1.1 platform (6846 malware samples), held in July 2016. Detecti…
2
1
Dejan “dejanmilo” Milosavljevic's profile photo
 
+Thorsten L guckstu hier. :-)
 ·  Translate
Add a comment...

Captain DevOps

General discussion  - 
 
 
Fake Linus Torvalds' Key Found in the Wild #security   #hacks  
Hi, Eric here, co-creator of evil32. I posted a brief note on our site about this, but here's a little more detail. I found an old (local) backup of the private keys and used it to generate revocation certificates for each key. Fortunately, there is no way for anyone else to access or regenerate ...
1
1
Add a comment...

Created by

About this community

The BrightTALK IT security community will cover breaking news in the industry and relevant topics like risk management, BYOD, malware and developing threats as well as mobile and application security. BrightTALK also tweets about IT security news and events from @InfoSecWebinars. Please post only relevant articles or resources!
San Francisco, NYC, London
 
HackedThat: Breaking in to a hardened server via the back door. It was an interesting read. Hope you guys will like it. #hacking #security #infosec #cybersecurity
1
Add a comment...

Ipswitch

General discussion  - 
 
Here are 15 things you can do to make passing your next IT audit a little more easily.
IT audit procedures run the gamut from internal to market-specific. Here are 15 recommendations for successful audit compliance.
1
Add a comment...

Sergey Gor (GreatSoftLine)

Threats and malware  - 
 
 
#security #ransomware

Alma Locker - a new strain of ransomware which encrypts users` data and then extort them a 1 bitcoin ransom within 5 days.. Alma Locker gets on the laptop via malicious attachments in electronic mail, and then promptly begins to encode folders. Approximate amount of payment is 550 USD. http://wp.me/p5IMg3-2rx
The Proofpoint researcher, Darien Huss, has recently discovered a new strain of ransomware which encrypts users` data and then extort them a 1 bitcoin ransom. Alma Locker gets on the laptop via mal…
1
Add a comment...

Jeff Snyder

General discussion  - 
 
 
Cybersecurity Vulnerability and Patch Report for the Week of August 21, 2016
CYBERSECURITY
VULNERABILITY AND PATCH REPORT FROM
OUR FRIENDS AT   CITADEL
INFORMATION GROUP   Important Security
Updates Avast: Avast! Free Antivirus has released version 12.3.2279. Updates
are available on Avast’s website . Dropbox: Dropbox has released v...
1
Add a comment...

Sergey Gor (GreatSoftLine)

Threats and malware  - 
 
 
#security #cybersecurity

Threats targeting telecommunication companies directly. These include DDoS attacks, targeted attacks (APT campaigns), network device vulnerabilities and human-related threats like insider access, social engineering and the risk of allowing third parties to access information.
http://wp.me/p3K4GZ-2uO
Threats directed at telecoms companies Threats targeting telecommunication companies directly. These
1
Add a comment...

David Bisson

General discussion  - 
 
Members of a pornography website targeted dozens of Australian schools so they could view and swap graphic sexual images of female students and other non-consenting women.

via +BleepingComputer 

http://www.bleepingcomputer.com/news/security/australian-porn-site-members-targeted-school-girls-for-wins-/
1
J Stone's profile photo
J Stone
 
:[
Add a comment...

Joe Pettit

General discussion  - 
 
If you speak to most experts in the field, they’ll agree on at least one thing: computer security isn’t really a technological problem.

By +Graham Cluley on +Tripwire, Inc. 
If your focus is elsewhere when an important security warning pops up, there's a good chance (up to 90%) it will be dismissed and completely ignored.
1
Add a comment...

Joe Pettit

General discussion  - 
 
Security researchers are warning of an espionage campaign, dubbed “Operation Ghoul,” heavily targeting organizations in the industrial, engineering and manufacturing sectors, since March 2015.

By +Maritza Santillan of +Tripwire, Inc. 
Researchers are warning of an espionage campaign, dubbed “Operation Ghoul,” targeting the industrial, engineering and manufacturing sectors.
1
1
Add a comment...

Lisa Starkweather

Application security  - 
 
Pass #Oracle 1Z0-881 Solaris 10 #Security Administrator Certified Expert Exam
Oracle 1Z0-881- Updated Exam Qestions. Get it free with the post below;
http://www.itsecuritycertifications.org/oracle-1z0-881-exam/
A General Description of Oracle 1Z0-881 Exam The Oracle 1Z0-881 Exam is suitable for people having jobs associated with the administration of security in an [...]
1
1
Add a comment...

David Bisson

Threats and malware  - 
 
Malware is believed to have infiltrated point-of-sale (POS) terminals and compromised customers' payment card information at 20 HEI Hotels & Resorts locations.

via +BleepingComputer 

http://www.bleepingcomputer.com/news/security/credit-card-info-exposed-by-pos-malware-at-some-starwood-and-hei-hotels/
1
Add a comment...