Infosecurity News

#RSAC: The Positives and Pitfalls of Surveillance
Industry boffins assess the technology power balance

Japan’s Nuke Reactor Firm Told to Migrate Off XP ASAP
Auditor claims security risks are too high for Tepco

Banking Botnets Bounce Back Despite Takedowns
Dell SecureWorks report points to resilient and evasive enemy

#RSAC: IBM Embraces the Cloud
In order to provide predictive analytics, actionable, open threat intelligence is a necessary piece of the puzzle.

#RSAC: How CISOs Can Gain the Ear of the Board
The role of the CISO is in a state of flux, as it affects real business processes beyond security, across the organization.
#RSAC: Encryption Hinders Government Fight Against Crime, says Homeland Security Chief
Secretary Jeh Jonson calls for greater collaboration with private sector
#RSAC: Time for Security to Leave the Dark Ages
Amit Yoran, RSA president, says that security must reach Enlightenment

PayPal Points Way to Edible Biometric Devices
Passwords need to perish, says payments giant

APT28 Back in RussianDoll Attack Using Adobe, Windows Flaws
Russian cyber gang aims might at foreign government entity

WikiLeaks Publishes Hacked Sony Docs, Emails
Hundreds of thousands of documents and emails from the Sony hack show “a rare insight into the inner workings of a large, secretive multinational corporation.”

Public-Facing Web Assets Expose Banks to Greater Risk
RiskIQ report claims each bank has 7500 external assets on average

HSBC Notifies Consumers of Mortgage Information Breach
The firm believes the exposure began sometime towards the end of 2014 and continued until March 27, 2015.

IBM Launches Open Threat Intelligence Platform
IBM has debuted a new data-sharing exchange that is modeled off of social networking.

UK Law Firms Putting Client Data at Risk
FoI request finds ICO warning has fallen on deaf ears

Government Report Criticizes Aircraft Cybersecurity
FAA must try harder to prevent mile-high hacking, says GAO

Misconfigured DNS Servers Leak Network Info
US-CERT warns that DNS servers may reveal internal network structure and potentially sensitive information.

LA Plans to Remotely Control Streetlights
There are a number of perks to giving the system the Internet of Things (IoT) treatment, but security concerns abound.

Internet of Evil Things Lurks in Corporate Networks
With more than 16 billion connected devices now deployed, rogue or unauthorized devices could be operating, undetected, across networks.

(ISC)2 Expands Operations in the National Capital Region
The expanded corporate presence reflects the large member concentration that the organization has in the Washington, D.C. area.

Log-in Stealing Attack Builds on 18-Year-Old Flaw
Redirect to SMB could give MITM attackers keys to the kingdom



