Infosecurity News

#BHUSA Empathy is Key to Hiring and Retaining Women in Cybersecurity
Rebecca Lynch of Duo Security gave a talk on hiring, and just as importantly retaining, women in the cybersecurity industry.

#BHUSA: Five Years of Google Project Zero Should Influence Similar Groups
Project Zero boss looks back at five years of research

#BHUSA: Increase Social Media Awareness With Active and Passive Testing
A new tool enables active social media testing.

#BHUSA: Defending Against Morphing DDoS with SODA
F5 Labs researchers release a new open source tool and model to help organizations prepare for and defend against an emerging form of disruptive attack.

Researchers Detect Spambot Recording Victims' Screens as They Watch Sexual Content
Malware-distributing spam campaigns are targeting people in France

FireEye Identifies Prolific Chinese Cyber-Threat Group
APT41 has targeted various industries across multiple jurisdictions.

Researchers Reveal 35 Flaws in Six Printers
Sysadmins urged to patch after latest discovery

CafePress Slammed After Major Breach Affecting 23 Million
Exposed data included unique email addresses and passwords

#BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk
Reclassifying phishing attacks, and the ways to help users spot them

North Korean Hackers Amass $2bn Via Cyber-Attacks
Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN

#BHUSA : Open Source is Key to Solving Cyber Skills Gap
At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry

#BHUSA: Keynote Encourages Positivity and Collaboration
The Black Hat USA keynote encourages better collaboration and a more positive culture

LokiBot Gets Sneakier With Steganography
LokiBot is getting stealthier and is now hiding its devastating payload in image files.

IBM's Warshipping Attacks Wi-Fi Networks From Afar
Forget wardriving; warshipping is a more targeted way to hit a company's wireless network, says IBM.

Children's Tablet Revealed Location, Researchers Found
LeapFrog's Pet Chat app was leaking children's location, say researchers.

#BHUSA: Need For Technologists to Be Recognized and Empowered
Why the world needs to empower technologists

#BHUSA: Jeff Moss Talks of Need to Be Better Communicators
Now Politicians and boards know cybersecurity, what do we do with the attention?

AT&T Workers Bribed to Unlock Millions of Customer Phones
DoJ indicts man who allegedly paid staff hundreds of thousands

Over 50% of Enterprises Are Failing on Cloud Security
Symantec report reveals app adoption is outpacing security efforts

New Intel SWAPGS Flaw Spells Bad News for Users
Firms and consumers urged to patch



