logoSign upLog in
Buzzes
  1. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Phishing
    Jaime Contreras
    Credit Card Data and Other Information Targeted in Netflix Phishing Campaign « Threat Research Blog
    www.fireeye.com FireEye Labs discovered a phishing campaign in the wild that is targeting primarily U.S.-based Netflix...
    Relevant
  2. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #BreachNews
    threatpost.com A database of 3.3 million Hello Kitty users tied to a 2015 breach surfaced over the weekend exposing thousands of minors to potential credential...
    Relevant
  3. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Malware
    Jaime Contreras
    Deadly KillDisk malware: Now in Linux
    www.scmagazine.com The notorious KillDisk malware is back, this time arriving as a Linux...
    Relevant
  4. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Ransomware
    Jaime Contreras
    MongoDB Ransomware Impacts Over 10,000 Databases
    www.eweek.com MongoDB database deployments are being attacked by multiple groups of attackers, that are encrypting data and demanding a ransom from...
    Relevant
  5. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #RiskManagement, #InfoSec
    Jaime Contreras
    The trouble with third-party security assessments
    www.csoonline.com If you let one customer perform security tests against your applications and network, you let yourself in for a lot of...
    Relevant
  6. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #CyberSec
    Jaime Contreras
    Defensive regression in cybersecurity
    www.csoonline.com There has been a lot of talk lately about defensive regression in cybersecurity. But what exactly is defensive regression? It's not the regression that Sigmund Freud talks about, although there are plenty of folks that don't act like adults in our...
    Relevant
  7. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #CyberSec
    Jaime Contreras
    2017: The year of cybersecurity scale
    www.networkworld.com Cloud, IoT, mobile and digital transformation will place new demands on usability, scalability and enterprise-class features of cybersecurity analytics and operations...
    Relevant
  8. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #Malware
    Jaime Contreras
    Memory-Resident Malware Creating Forensics Challenges
    www.careersinfosecurity.com Because cyberattackers are now using memory-resident malware that leave no trace on the disk, forensics experts using traditional methods will face a...
    Relevant
  9. Jaime Contreras

    Jaime Contreras

    12/01/2017
    #InfoSec
    Jaime Contreras
    Self-defense: Training your network to defend itself
    www.securityinfowatch.com Software programs that evolve after deployment to match wits with hackers and mitigate new threats goes beyond science...
    Relevant
  10. Jaime Contreras

    Jaime Contreras

    11/01/2017
    #InfoSec
    Jaime Contreras
    C-suiters: Keep an eye on these technologies in 2017 | FierceHealthcare
    www.fiercehealthcare.com From Pepper, the emotional interactive robot, to the new da Vinci Xi Integrated Table Motion, ECRI Institute highlights 10 healthcare technologies C-suiters should keep an eye on in 2017. The organization's annual watch list outlines technologies...
    Relevant
  11. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    DDoS-for-hire services thrive despite closure of major marketplace
    www.itworld.com The closure of a major online marketplace for paid distributed denial-of-service attacks may have done little to slowdown the illegal activities from taking...
    Relevant
  12. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Ransomware
    Jaime Contreras
    This ransomware targets HR departments with fake job applications | ZDNet
    www.zdnet.com Campaign targets those who most often need to open attachments from unknown...
    Relevant
  13. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #MobileSec
    Jaime Contreras
    Data: More vulnerabilities found in Google Android than any other program in 2016
    www.scmagazine.com Amassing 523 distinct coding flaws this past year, Google's Android mobile operating system took top spot among the 50 products with the most discovered vulnerabilities in 2016, according to the security vulnerability database website CVE...
    Relevant
  14. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Cloudmark Security Predictions for 2017
    blog.cloudmark.com The Internet of Things will be an ever-increasing threat. We have already seen massive botnets of home routers and security cameras used for devastating DDoS attacks such as the one on Dyn. The...
    Relevant
  15. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #IoT, #InfoSec
    Jaime Contreras
    IoT: The Need to Expand the Scope of Security
    www.careersinfosecurity.com To deal with the risks posed by the explosive growth of the internet of things, CISOs and CIOs must expand the scope of their security efforts, says...
    Relevant
  16. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Why soft skills outweigh hard skills for IT-business collaboration
    www.computerworld.com There's a growing demand for more cross-collaboration with IT and other departments, which means IT workers not only need technical skills, but also the soft skills to serve as the authority on...
    Relevant
  17. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Privacy, #CyberSec
    Defending Our Privacy—A True Story
    www.isaca.org
    Relevant
  18. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #CyberSec
    Jaime Contreras
    Sophos cautions firms against increased cybercrimes menace
    guardian.ng Sophos Group, a security software and hardware company, has called on organisations to prepare adequately well against possible attacks from cybercriminals in...
    Relevant
  19. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Malware
    Jaime Contreras
    Hackers have a new way to steal your banking login using WhatsApp
    bgr.com Hackers are targeting unsuspecting users with a new type of mobile virus that spreads through legitimate-looking word documents sent via WhatsApp, which could then steal sensitive information from...
    Relevant
  20. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #InfoSec
    Jaime Contreras
    Hate 'contact us' forms? This PHPmailer zero day will drop shell in sender
    www.theregister.co.uk Borked patch opens remote code execution on web...
    Relevant
  21. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #Phishing
    Jaime Contreras
    Criminals phish credit card numbers with 'Twitter verification' scam
    www.scmagazine.com Criminals are targeting users on Twitter purporting to offer verified account status but instead taking over their accounts, according to...
    Relevant
  22. Jaime Contreras

    Jaime Contreras

    10/01/2017
    #CyberSec
    Jaime Contreras
    Cyber security trends for 2017
    www.interaksyon.com Cyber security provider Sophos looks into his crystal ball to predict the top cyber security trends for...
    Relevant
  23. Jaime Contreras

    Jaime Contreras

    09/01/2017
    #Ransomware
    Jaime Contreras
    Roundup: Ransomware Statistics 2016 [Infographic] - Armada Cloud
    www.armadacloud.com The state of ransomware in 2016 - statistics on ransomware growth and ransomware attacks and activity presented in a downloadable free...
    Relevant
  24. Jaime Contreras

    Jaime Contreras

    06/01/2017
    #InfoSec
    Jaime Contreras
    Good Security is a Marathon, Not a Sprint | SecurityWeek.Com
    www.securityweek.com Information security should be a marathon and not a sprint, which allows us to plan, course correct, and adjust over time to get to where we need to...
    Relevant

    Comments

  25. Jaime Contreras

    Jaime Contreras

    04/01/2017
    #Phishing
    Jaime Contreras
    Social engineering still a trouble spot for health IT
    iapp.org
    Relevant
See all