Infosecurity News

  1. #UNITEDsummit: Heisenberg Project Outlines Cloud Attack Realities

    Honeypots analyzed attacks inside AWS, Microsoft Azure, Digital Ocean, Google Cloud, Rackspace and IBM SoftLayer.

  2. Kremlin Hackers Are Exploiting Microsoft's Unpatched Zero-Day

    Russia's politically motivated Fancy Bear group is actively using the flaw—and a patch won't be available until Election Day.

  3. Google to Distrust WoSign/StartCom Certificates

    WoSign knowingly and intentionally mis-issued certificates in order to circumvent browser restrictions and CA requirements.

  4. MI5 Boss Warns of ‘Aggressive’ Russian Cyber Threat

    Andrew Parker claims Kremlin is on the offensive

  5. Google AI Can Create Its Own Encryption

    Google Brain has shown that artificial intelligence has the ability to create its own cryptography standard, dynamically.

  6. Flash, Windows Zero-days Are Being Actively Exploited in the Wild

    Microsoft hasn't patched the Windows flaw—a local privilege escalation that can be used as a security sandbox escape.

  7. Fake Palo Alto Cyber-conference Invites Deliver Spy Trojan

    The effort is related to ongoing Operation Lotus Blossom attack campaigns in the Asia Pacific region.

  8. National Cyber Security Strategy Aims to Defend, Deter, Develop

    Chancellor Philip Hammond has launched the new UK cybersecurity strategy, built on developing future talent, protecting what we have and identifying the malicious few.

  9. Firms Value Threat Intel … But Fail to Use it Properly

    Anomali survey finds organizations are suffering from data overload

  10. NHS Trust Suspends Operations After Major Cyber Incident

    Patients transferred after IT systems are shut down

  11. Trend Micro: Fake Apple iOS Apps Are Rampant

    The Apple iOS environment is riddled with malicious fake apps, signed with enterprise certificates.

  12. IoT Control Wins Trusted Environment Hackathon

    SafeHaven, a system for granular control of IoT devices in smart homes, has won Trusted Execution Environment (TEE) hackathon.

  13. Cyberbit Range Offers Simulated Attack Training

    The Cyberbit Range provides lifelike simulation for security operations trainees—kind of like the holodeck, in Star Trek.

  14. Converse E-Commerce Site Hacked for Payment Info

    The Australian online site for the iconic sneaker brand was compromised for more than a month.

  15. Most Americans Believe a Tech-Enabled Terrorist Attack is Imminent

    58% of participants under 30 believed that a technology-based terrorist threat was imminent.

  16. IT Admins Urged to Patch Critical Industrial Control Flaw

    Bug could allow hackers to physically control equipment

  17. Security Boost as Google Makes Certificate Transparency Mandatory

    CT is designed to help prevent abuse of SSL cert system

  18. 45% of Consumers Are Victims of Cybercrime

    The most common type of attack that consumers fall victim to are false requests to reset social media account passwords.

  19. Dyn: IoT-Based DDoS Launched by Just 100K Endpoints

    Retry activity from legitimate servers complicated the attack

  20. Over 80% of Employees Lack Security/Privacy Awareness – Report

    MediaPro claims bad practice is endemic in the US

What’s Hot on Infosecurity Magazine?