Infosecurity News

  1. Amazon Follows Apple in Complying with China's Internet Crackdown

    AWS users asked to cease any and all use of VPNs and other anonymization and encryption technologies.

  2. Home Secretary Jets to Silicon Valley for Terror Talks

    Rudd wants social media companies to step up action on terrorist content

  3. Anthem Medicare Patients Hit with Breach

    Medicare patients on its insurance roster may be affected by identity theft, thanks to a potentially malicious employee at a third-party company.

  4. International Threat Intelligence and Info-Sharing Surges in 2017

    Translations surge by triple digits, indicating robust information-sharing practices amid notable cybercrime incidents.

  5. FireEye Dismisses Compromise Claims over #LeakTheAnalyst Operation

    FireEye has refuted claims about compromise of its systems after an employee’s social media accounts were defaced.

  6. Apple Removes VPNs from China App Store

    Tech firm in a bind following government crackdown

  7. Verticals Vary Widely When it Comes to Prioritizing Cyber

    About 60% of finance/insurance execs consider cybersecurity a very high priority, vs 15% in hospitality and food.

  8. Emotet Crimeware Adds Self-Propagation to the Mix

    It can now pivot within a network to brute-force server accounts, and it harvests Outlook credential info to expand phishing net.

  9. German Police to Bypass Encryption by Hacking Devices

    Strategy would circumvent need to request encryption backdoors from providers

  10. Global Operation Ends in Arrest of US DDoS Suspect

    Australian, Canadian and US law enforcers worked on case for over two years

  11. Tech Industry Calls for Open Immigration to Ease Skills Crisis

    Cybersecurity sector already has big problems recruiting enough workers

  12. #BHUSA: You’re Dealing with Supply Chain Security Whether You Like it or Not

    Improving the standard of security best practices across your supply chain is very difficult

  13. Majority of Global Orgs Lack Security Best Practices

    For instance, four out of five companies don’t know where their sensitive data is located, or how to secure it.

  14. Iranian Espionage Campaign Hinges on Beautiful (But Fake) Woman

    A well-established collection of fake social media profiles for 'Mia Ash' build trust and rapport with potential victims.

  15. Microsoft Turns Up $250,000 Bug Bounty for Windows

    The program will pay out for remote code execution, elevation of privilege, or design flaws that compromise privacy or security.

  16. #BHUSA: Panel – Fad or Future? Getting Past the Bug Bounty Hype

    At Black Hat 2017 a panel of experts gathered to discuss the concept of bug bounty programs and share their experiences with running these within their respective companies

  17. #BHUSA: Ransomware Profits Worth More than $25 Million (At Least)

    Researchers say 2016 was "turning point" for ransomware and a year in which it became a multi-million dollar business

  18. Google Uncovers Highly Targeted Spyware "Lipizzan"

    Israeli firm pegged for developing tool, possibly for state use

  19. Consumers Don't Trust Governments to Protect Data or Fight Cybercrime

    Venafi study says majority disagree with encryption backdoors

  20. #BHUSA: Phishing Psychology: Why Training Fails & Attacks Prevail

    Karla Burnett, security engineer at Stripe, explored ‘phishing as a science’, shining a light on the psychology of phishing and why attacks continue to be successful

What’s Hot on Infosecurity Magazine?