Infosecurity News

  1. Pharma Giant Merck Sees Petya Profit Hit for Rest of 2017

    Merck said it still doesn’t know the full magnitude of the impact of the attack.

  2. FireEye Confirms Details of Two Customers were Exposed

    FireEye has confirmed that business documents related to two separate customers in Israel have been ‘exposed’.

  3. Carbanak Drops New Backdoor to Step Up Info Theft

    “Bateleur” features robust anti-detection capabilities

  4. Alexa Hack Allows Continuous Eavesdropping

    Attackers can record and stream conversations that take place within Alexa’s “hearing,” and send them to a remote computer.

  5. Amazon Follows Apple in Complying with China's Internet Crackdown

    AWS users asked to cease any and all use of VPNs and other anonymization and encryption technologies.

  6. Home Secretary Jets to Silicon Valley for Terror Talks

    Rudd wants social media companies to step up action on terrorist content

  7. Anthem Medicare Patients Hit with Breach

    Medicare patients on its insurance roster may be affected by identity theft, thanks to a potentially malicious employee at a third-party company.

  8. International Threat Intelligence and Info-Sharing Surges in 2017

    Translations surge by triple digits, indicating robust information-sharing practices amid notable cybercrime incidents.

  9. FireEye Dismisses Compromise Claims over #LeakTheAnalyst Operation

    FireEye has refuted claims about compromise of its systems after an employee’s social media accounts were defaced.

  10. Apple Removes VPNs from China App Store

    Tech firm in a bind following government crackdown

  11. Verticals Vary Widely When it Comes to Prioritizing Cyber

    About 60% of finance/insurance execs consider cybersecurity a very high priority, vs 15% in hospitality and food.

  12. Emotet Crimeware Adds Self-Propagation to the Mix

    It can now pivot within a network to brute-force server accounts, and it harvests Outlook credential info to expand phishing net.

  13. German Police to Bypass Encryption by Hacking Devices

    Strategy would circumvent need to request encryption backdoors from providers

  14. Global Operation Ends in Arrest of US DDoS Suspect

    Australian, Canadian and US law enforcers worked on case for over two years

  15. Tech Industry Calls for Open Immigration to Ease Skills Crisis

    Cybersecurity sector already has big problems recruiting enough workers

  16. #BHUSA: You’re Dealing with Supply Chain Security Whether You Like it or Not

    Improving the standard of security best practices across your supply chain is very difficult

  17. Majority of Global Orgs Lack Security Best Practices

    For instance, four out of five companies don’t know where their sensitive data is located, or how to secure it.

  18. Iranian Espionage Campaign Hinges on Beautiful (But Fake) Woman

    A well-established collection of fake social media profiles for 'Mia Ash' build trust and rapport with potential victims.

  19. Microsoft Turns Up $250,000 Bug Bounty for Windows

    The program will pay out for remote code execution, elevation of privilege, or design flaws that compromise privacy or security.

  20. #BHUSA: Panel – Fad or Future? Getting Past the Bug Bounty Hype

    At Black Hat 2017 a panel of experts gathered to discuss the concept of bug bounty programs and share their experiences with running these within their respective companies

What’s Hot on Infosecurity Magazine?