Infosecurity News

  1. #IAPP Conference: Panel - Whose Eye is on the Five Eyes? An Intro to International Oversight Bodies

    A panel of privacy commission representatives discussed the role of their organizations amid heightened public concern over state surveillance activities

  2. #IAPP Conference: Panel - GDPR Beyond May of 2018

    At IAPP a panel of senior privacy executives from leading multi-national corporations discussed how their organizations are preparing for implementation of the GDPR

  3. (ISC)2 Issues Recommendations to Trump Administration

    (ISC)2 urges prioritization of workforce development within the pending cybersecurity executive order.

  4. Researchers Find Multiple RCE Bugs in Linksys Routers

    IOActive works with manufacturer on issues with Smart Wi-Fi models

  5. Android SMS Spyware Sees Millions of Downloads

    SMSVova can steal and relay a victim's location to an attacker in real time.

  6. Mobility Programs Snowball but Security Concerns Remain

    57% of respondents are concerned about corporate data on personal and other non-managed devices.

  7. FBI and CIA Hunt for Vault7 Insider: Report

    Agencies look for Snowden 2.0

  8. Mirai-Busting Hajime Worm Could be Work of White Hat

    P2P-controlled malware blocks IoT device access to suspect ports

  9. Hundreds of Google Play Apps Infected with the BankBot Trojan

    It infiltrates benign programs, hitching a ride to installation on users’ phones. Then it steals banking credentials and card details.

  10. Board Members Want a Helicopter View of Cyber-risk

    They don't want CISOs’ day-to-day view of threats and trends—which is more analogous to driving tanks through the mud.

  11. Bad Guys Still Rely on Marks to Click on Something

    On Monday holidays, alerts dip significantly, due to a lack of employees interacting with malicious emails, attachments and links.

  12. #CRESTCon & IISP Congress: Passive Data Sources Can Make System Mapping Great Again

    There is a lot to learn from listening to our systems

What’s hot on Infosecurity Magazine?