Information Security News |
Computing | Infosec 2014: Investment in cyber security a major selling point to potential ... Computing An organisation's investment in cyber security - particularly in the financial services field - is a major selling point for sales reps that are looking to lure in new clients, according to Michael Colao, the head of security at insurance firm AXA UK ... |
Hacks that allow spies, villains, or terrorists to manipulate traffic signals may seem like the exclusive province of action movies, but a well-known security researcher says they're not as far-fetched as many people may think.
Cesar Cerrudo of security penetration testing firm IOActive said he has identified more than 50,000 devices in New York, Washington DC, Los Angeles, and cities in at least seven countries around the world that can be hacked using inexpensive gear that's easy and—at least in the US—legal to obtain and operate. The equipment Cerrudo used included a drone flying at heights of 650 feet and radio hardware that sells for $100. With more sophisticated transmitters, antennas, and other hardware, he said an attacker could be as far away as two miles from the targeted signals.
In a blog post published Wednesday, he wrote:
Read 6 remaining paragraphs | Comments
The State Department unveiled Wednesday that it is widely employing social media as a method to counter online violent extremism from Al-Qaeda and others.
Buried in an intelligence report published Wednesday, the government said that the Center for Strategic Counterterrorism Communications (CSCC), established in 2011, last year produced more than 10,000 online postings globally, some of which included one of 138 government-produced videos.
"CSCC's programs draw on a full range of intelligence information and analysis for context and feedback. CSCC counters terrorist propaganda in the social media environment on a daily basis, contesting space where AQ and its supporters formerly had free rein. CSCC communications have provoked defensive responses from violent extremists on many of the 249 most popular extremist websites and forums as well as on social media," said the document, Country Reports on Terrorism 2013 (PDF).
Read 4 remaining paragraphs | Comments
Computing | Infosec 2014: Threat knowledge is key to cyber security, say experts ComputerWeekly.com Infosec 2014: Threat knowledge is key to cyber security, say experts · Infosec 2014: US tech dominance Europe's fault, says Mikko Hypponen · Interview: Nick Roberts, president of Socitm and IT group manager · View All News. Sponsored News; Six ... FBI bigwig pleads for help from ISPs in fight against cyber crime |
Computing | Infosec 2014: BlackBerry customers showing “tremendous interest” in new BES ... Computing Vice-president of security product management and research at BlackBerry, Michael K Brown, spoke to Computing at the Infosec conference in London today, saying that the EZ Pass scheme, which launched at the start of this month, had experienced ... |
We've received multiple reports regarding impact to UltraDNS services which are allegedly the result of a 100Gb/s attack on one of their customers, which in turn is causing latency for others. Monitor #ultradns for the time being as no official report has been released yet by UltraDNS. One reporting party did indicate that they learned that the management of UltraDNS had said that one of their customers was being attacked and that they black-holed that customer to get back on trend. Resolver nodes around the world are resetting.
We'll update here as we learn more.
Update as of 1045 PST: UltraDNS is still not stable as customers are still having intermittent DNS resolution failures
Update as of 1100 PST: UltraDNS still propagating changes from the attack this morning and hope to be complete as of approximately 11:30 PST. Intermittent issues still remain for customers. Always a bit ironic when those who sell DDoS protection are themselves adversely impacted by DDoS. :-)
Update as of 1240 PST: Direct quote from Neustar UltraDNS - "Currently, the Neustar UltraDNS Operations and Security teams continue to work with our Tier One Providers to further refine upstream mitigations within the Carriers networks. Additionally, the Neustar team is working on adding additional UltraDNS Name Servers into active mitigation. The DDoS traffic continues to shift attack vectors and our teams are working on altering countermeasures to insure stability of
service as quickly as possible.
At Neustar, we are committed to providing the highest levels of performance and reliability through the products and solutions we deliver. Please feel free to contact our 24x7 UltraDNS Support Team at [email protected] with any questions or concerns."
Update as 1400 PST: "The Neustar UltraDNS Operations and Security teams have the majority of the UltraDNS customer base in mitigation on our DDoS mitigation
network. Currently, only customers utilizing a segment of UltraDNS Name Server addresses (PDNS1-PDNS6) are experiencing resolution latency due to intermittent network saturation in the Western US. We continue to aggressively refine mitigations for these customers and hope to have the issue resolved shortly."
NOTE: Customers are indicating that Neustar UltraDNS has been providing constant updates (5 or 6 now) which should be seen as a positive response to a difficult situation.
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.Computing | Infosec 2014: EU cybercrime head blames TOR for making it difficult to catch ... Computing Troels Oerting, the head of the European Cybercrime Centre (EC3), has blamed the "darknet" for making it difficult to catch cyber-criminals in his keynote speech to Infosecurity Europe in London. Furthermore, he added, the revelations of former US ... Infosec 2014: Cyber safety will take joint effort, says top EU cyber cop Cuffing darknet-dwelling cyberscum is tricky. We'll 'disrupt' crims instead ... Infosecurity Europe 2014 > Security Can Be A Business Enabler |
Computing | Infosec 2014: Word document threat intelligence not good enough - Santander Computing Threat intelligence providers that pass on Word documents which detail what an organisation's threats are and how it can best tackle them are most likely not good enough, according to Santander's head of operational risk unit, Michael Paisley. Speaking ... |
SC Magazine UK | Infosec 2014: US tech dominance Europe's fault, says Mikko Hypponen ComputerWeekly.com Infosec 2014: US tech dominance Europe's fault, says Mikko Hypponen · Software developers suffer as IT companies endure rising insolvencies · Oracle updates Solaris, but is its server strategy sound? View All News. Sponsored News; Six considerations ... Security guru: You can't blame EDWARD SNOWDEN for making US clouds ... Europe needs to build its own cloud services |
University brings infosec courses to London Help Net Security The University of South Wales is to open a Centre in the heart of London's Docklands financial district where it will deliver a range of professional level courses in information and cyber security, it has been announced at Infosecurity Europe 2014. |
Computing | Infosec 2014: make IT security a personal issue for staff, say CISOs Computing Security chiefs at Infosecurity Europe 2014 urged companies to raise awareness of cyber security by simply talking to employees about how to protect their own home PCs and laptops. Channel 4 CISO Brian Brackenborough explained that the security team ... |
Posted by InfoSec News on Apr 30
http://www.forbes.com/sites/jennifergranick/2014/04/29/obama-policy-on-zero-days-crap/Infosec 2014: Datacentre security key to cloud security, says Google ComputerWeekly.com The security challenges of the cloud are fundamentally the same as those of any in-house datacentre, says Peter Dickman, engineering manager at Google. This means securing data in both can be tackled in the same way, he told attendees of Infosecurity ... |
Posted by InfoSec News on Apr 30
http://www.careersandeducation.com/top-security-certifications-2014Posted by InfoSec News on Apr 30
http://www.lithuaniatribune.com/67422/cyber-spying-bug-attack-plans-found-in-lithuania-report-201467422/Posted by InfoSec News on Apr 30
http://www.technologyreview.com/news/527016/wheres-the-next-heartbleed-bug-lurking/Posted by InfoSec News on Apr 30
http://www.cnbc.com/id/101623392