(ISC)2 Issues Recommendations to Trump Administration
(ISC)2 urges prioritization of workforce development within the pending cybersecurity executive order.
Researchers Find Multiple RCE Bugs in Linksys Routers
IOActive works with manufacturer on issues with Smart Wi-Fi models
Android SMS Spyware Sees Millions of Downloads
SMSVova can steal and relay a victim's location to an attacker in real time.
Mobility Programs Snowball but Security Concerns Remain
57% of respondents are concerned about corporate data on personal and other non-managed devices.
FBI and CIA Hunt for Vault7 Insider: Report
Agencies look for Snowden 2.0
Mirai-Busting Hajime Worm Could be Work of White Hat
P2P-controlled malware blocks IoT device access to suspect ports
Hundreds of Google Play Apps Infected with the BankBot Trojan
It infiltrates benign programs, hitching a ride to installation on users’ phones. Then it steals banking credentials and card details.
Board Members Want a Helicopter View of Cyber-risk
They don't want CISOs’ day-to-day view of threats and trends—which is more analogous to driving tanks through the mud.
Bad Guys Still Rely on Marks to Click on Something
On Monday holidays, alerts dip significantly, due to a lack of employees interacting with malicious emails, attachments and links.
#CRESTCon & IISP Congress: Passive Data Sources Can Make System Mapping Great Again
There is a lot to learn from listening to our systems
Call for DHS to Abandon Demands for Travelers' Social Log-Ins
Rights groups claim plans will undermine cybersecurity for those entering US
#CRESTCon & IISP Congress: NCSC's Ian Levy: Time to Stop the Bad Cybersecurity Advice
Speaking in the opening keynote session at CRESTCon & IISP Congress today Ian Levy, technical director, National Cyber Security Centre, said it's time to stop issuing ‘bad advice’ about cyber-threats and defense