logoSign upLog in
Buzzes
  1. Jaime Contreras

    Jaime Contreras

    08/12/2016
    Jaime Contreras
    FTC Announces New Guidance on Ransomware | Privacy and Cybersecurity Law
    www.privacyandcybersecuritylaw.com
    Relevant
  2. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #BreachNews
    Jaime Contreras
    Reports: Hackers Steal $31 Million from Russia's Central Bank
    www.bankinfosecurity.com Hackers apparently stole $31 million from accounts that banks keep at Russia’s central bank in a series of cyberattacks this year, according to several...
    Relevant

    Comments

    Erroll -EL- Warner
    08/12/2016 #1 Erroll -EL- Warner
    Be careful what you wish for. If the allegation is true someone is sending a message to Putin that his system is also venerable.
  3. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #IoT, #Malware
    Jaime Contreras
    Researchers Find Fresh Fodder for IoT Attack Cannons — Krebs on Security
    krebsonsecurity.com
    Relevant
  4. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #CyberSec
    Jaime Contreras
    'Cybersecurity has become a full-time job' in healthcare - MedCity News
    medcitynews.com 2016 has been another rotten year for cybersecurity, How can healthcare catch...
    Relevant
  5. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #CyberSec
    Jaime Contreras
    Advancing the science of cybersecurity | NSF - National Science Foundation
    www.nsf.gov NSF's mission is to advance the progress of science, a mission accomplished by funding proposals for research and education made by scientists, engineers, and educators from across the...
    Relevant
  6. Jaime Contreras

    Jaime Contreras

    07/12/2016
    #InfoSec, #RiskManagement
    Jaime Contreras
    CISO Cris Ewell on Overcoming Risk Management Challenges
    www.careersinfosecurity.com Why is risk management so difficult for so many healthcare organizations? Cris Ewell, CISO at University of Washington Medicine, offers insights in this...
    Relevant
  7. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #Ransomware
    Jaime Contreras
    Beware: Scalable Vector Graphics Files Are A New Ransomware Threat - Dark Reading
    www.darkreading.com SVG files offer many advantages as far as graphics go, but hackers looking to embed malware on websites can exploit...
    Relevant
  8. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #InfoSec
    Jaime Contreras
    Compliance doesn't equal security, but it sure does help
    www.scmagazine.com Imagine using faulty information in creating a building design or developing a product or running a political campaign or formulating a new...
    Relevant
  9. Jaime Contreras

    Jaime Contreras

    03/12/2016
    #Malware
    Jaime Contreras
    Tech support scammers up their game with ransomware (UPDATED)
    blog.malwarebytes.com Ransomware is so popular that even tech support scammers have eventually adopted it. Now the ransom note asks you to call 'Microsoft' to get your encrypted files...
    Relevant
  10. Jaime Contreras

    Jaime Contreras

    02/12/2016
    #CloudSec, #IoT
    Jaime Contreras
    ​Cloud Security and IoT Security to dominate coming years, says Intel Report
    cyware.com Intel Security has come out with its report titled “McAfee Labs 2017 Threats Predictions Report”. The report speaks about threat trends that would be observed in the upcoming year 2017. The trends include ransomware attacks, privacy concerns,...
    Relevant
  11. Jaime Contreras

    Jaime Contreras

    29/11/2016
    #CyberSec
    Jaime Contreras
    In Opinion: John McAfee claims cyber defence is decades behind weaponized software
    www.newsweek.com Cybersecurity pioneer John McAfee says only a fool would think there is effective cyber...
    Relevant
  12. Jaime Contreras

    Jaime Contreras

    29/11/2016
    #Ransomware
    Jaime Contreras
    Ransomware Result: Free Ticket to Ride in San Francisco
    www.bankinfosecurity.com A ransomware attack against San Francisco's Muni public transportation network attack over the busy Thanksgiving holiday - and Black Friday shopping - weekend...
    Relevant
  13. Kevin Mitnick

    Kevin Mitnick

    28/11/2016
    The Wildcard SSL Certificate for Sub-Domains Security
    Kevin Mitnick
    The Wildcard SSL Certificate for Sub-Domains Security (with image) · aboutssl
    storify.com Cheap Wildcard SSL Certificate for Unlimited Sub-Domains...
    Relevant
  14. Kevin Mitnick

    Kevin Mitnick

    28/11/2016
    Reviews of Comodo Essential SSL Wildcard Certificate
    Kevin Mitnick
    Reviews of Comodo Essential SSL Wildcard Certificate
    aboutssl.tumblr.com The Comodo Essential Wildcard SSL certificate has ability to secure an unlimited number of sub-domains with a single certificate. A Wildcard SSL is the best option for those who has...
    Relevant
  15. Kevin Mitnick

    Kevin Mitnick

    24/11/2016
    The Difference Between a Standard SSL and EV SSL Certificate
    Kevin Mitnick
    The Difference Between a Standard SSL and EV SSL Certificate
    www.slideshare.net A Standard SSL certificate is ideal for small and medium businesses, where an EV SSL certificate is an industry’s highest level of assurance SSL best for...
    Relevant
  16. Jaime Contreras

    Jaime Contreras

    22/11/2016
    #Malware
    Jaime Contreras
    Security Experts Call For Regulation On IoT Cybersecurity
    www.darkreading.com During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to...
    Relevant
  17. Jaime Contreras

    Jaime Contreras

    22/11/2016
    #Malware
    Jaime Contreras
    It's okay I'm on the list...trojan whitelists itself to stay connected to attackers
    www.scmagazine.com Authors of the Android.Fakebank.B malware developed a new trick whitelist itself on a users device to stay connected with the...
    Relevant
  18. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Linux, #InfoSec
    Jaime Contreras
    How to fix the Cryptsetup vulnerability in Linux - TechRepublic
    www.techrepublic.com A new vulnerability has been found to affect encrypted Debian and Ubuntu systems. Here's how to put a temporary fix on the Cryptsetup...
    Relevant
  19. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Ransomware
    Jaime Contreras
    This ransomware uses your social media profiles to personalise its demands | ZDNet
    www.zdnet.com Brazen desktop locker campaign uses social media info to make its threat more compelling to...
    Relevant
  20. Jaime Contreras

    Jaime Contreras

    21/11/2016
    #Ransomware
    Jaime Contreras
    New ransomware variant extorts your reputation rather than money
    www.scmagazine.com Researchers at security firm ProofPoint have discovered a new variant of malware which triggers it's ransom screen once it finds indecent...
    Relevant
  21. Kevin Mitnick

    Kevin Mitnick

    21/11/2016
    What is a Multiple Domain (SAN) SSL certificate?
    Kevin Mitnick
    What is a Multiple Domain (SAN) SSL certificate?
    www.linkedin.com Multi domain (SAN) is a built in feature comes with an SSL certificate which lets users to secure multiple domains under a single certificate. Depends on certificate authority, a user can secure up...
    Relevant
  22. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec
    Jaime Contreras
    €350bn cyber crimewave to become a tsunami as high-tech heists soar - Independent.ie
    www.independent.ie High-tech heists are costing businesses worldwide €350bn a year and a cyber crimewave is hitting...
    Relevant

    Comments

    Kevin Baker
    18/11/2016 #1 Kevin Baker
    To eliminate the majority of these problems IT should incorporate one way encryption logins
  23. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec, #AI
    Jaime Contreras
    Artificial intelligence and cybersecurity: The future is here | Microsoft Secure Blog
    blogs.microsoft.com
    Relevant
  24. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #CyberSec
    Jaime Contreras
    The next big hacking threat is already happening—you just can’t see it
    qz.com Cyberattacks are the norm at power plants, factories, and...
    Relevant
  25. Jaime Contreras

    Jaime Contreras

    18/11/2016
    #Malware
    Jaime Contreras
    This malware attack starts with a fake customer-service call
    www.networkworld.com Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email...
    Relevant
See all