Category: IA News
-
Hackers Can Make $250,000 Selling iOS Exploits To The Government | Cult of Mac
iOS hackers are some of the most sought after individuals in the security research community. Geniuses like Comex who come up with jailbreaks used by millions of iPhone and iPad users are offered incredible sums of money to sell their exploits to powerful and high profile clients. Sure, you could win a decent amount of…
-
JP Morgan’s security breach points to broader issues in cyber security | VentureBeat | Business | by Ruth Reader
Recent revelations surrounding hacker attacks infiltrating JPMorgan Chase & Co. leave questions about why we’re seeing an increasing number of successful attacks on major institutions. It turns out that protecting an institution full of personally identifiable information is more complex than just having a good cybersecurity team. Hackers were able to unleash malicious software onto Chase’s internal…
-
What went wrong with Microsoft’s August updates? | ZDNet
It’s been a long time since Microsoft had a Patch Tuesday this bad. By Friday they were conceding problems with several updates. Not only did they withdraw four updates, but they recommended that users uninstall one of them. via What went wrong with Microsoft's August updates? | ZDNet.
-
Target Staff Raised Security Concerns Before Data Breach – WSJ.com
Target Corp.’s TGT -0.66% computer security staff raised concerns about vulnerabilities in the retailer’s payment card system at least two months before hackers stole 40 million credit and debit card numbers from its servers, people familiar with the matter said. Members of Target’s computer-security staff raised concerns about vulnerabilities in the retailer’s payment-card system before…
-
U.S. Gives Cybersecurity Advice to Critical Infrastructure Operators—But No Rules – IEEE Spectrum
The U.S. government, finally realizing that it has to take action to ensure a minimum level of cybersecurity in networks that manage the nation’s energy, water and financial services, presented the Framework for Improving Critical Infrastructure Security on Wednesday. The document, which was put together by industry and government experts, is a compilation of cybersecurity standards…
-
Detecting Snowden – The Insider Threat | Tenable Network Security
When I discuss the insider threat with folks in the community, there seems to be several schools of thought. For example, some will apply a much lower risk to the insider threat, treating it as a one-off chance that an employee gets mad and does something bad out of spite. While this is a possibility,…
-
Denial of Service (DDoS) Cyber attacks – are they using the same logic as terror threats? – Defense Update – Military Technology & Defense News
Denial of Service (DDoS) Cyber attacks – are they using the same logic as terror threats? – Defense Update – Military Technology & Defense News.
-
Mapped: What Global Cyberwar Looks Like in Real Time | FP Passport
Mapped: What Global Cyberwar Looks Like in Real Time via Mapped: What Global Cyberwar Looks Like in Real Time | FP Passport.
-
Adobe Rubs Salt in the Wound
Adobe Systems Incorporated – after a compromise needs to have users change their passwords. Not knowing a better way to deal with this Adobe sent an easy to spoof email. Can you say phishing in ten seconds? Maybe they should try a signed email? What do you think?
-
Microsoft reports IE zero-day attacks | ZDNet
Microsoft is reporting an unpatched vulnerability in all versions of Internet Explorer. All versions of IE, other than those running on Windows Server, are vulnerable. This includes Internet Explorer 11 on Windows 8.1 and RT. via Microsoft reports IE zero-day attacks | ZDNet.