IBM warns of rising VoIP cyber-attacks

Cyber-attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months, according to a report from IBM’s Security Intelligence group this week. “SIP is one of the most commonly used application layer protocols in VoIP technology… we Read more about IBM warns of rising VoIP cyber-attacks[…]

Share

12% off Nest Cam Indoor Security Camera – Deal Alert

Look after your home 24/7 in crisp 1080p HD. With Nest Cam Indoor, you can check in, even when you’re out, and even at night with its built-in high-quality night vision. Nest Cam features a versatile magnetic stand that lets you put it anywhere. See who’s there, listen in and speak up to get their attention. Read more about 12% off Nest Cam Indoor Security Camera – Deal Alert[…]

Share

Android malware steals access to more than 1 million Google accounts

A new Android malware has managed to steal access to more than 1 million Google accounts, and it continues to infect new devices, according to security firm Checkpoint. “We believe that it is the largest Google account breach to date,” the security firm said in Wednesday blog post. The malware, called Gooligan, has been preying Read more about Android malware steals access to more than 1 million Google accounts[…]

Share

Senators fail to stop new rules allowing US law-enforcement hacking

Three senators’ efforts to stop a major expansion of U.S. law enforcement agencies’ hacking powers has failed for now. Proposed changes to Rule 41, the search-and-seizure provision in the Federal Rules of Criminal Procedure, will go into effect Thursday barring any last-minute action in Congress.  The rules change will give U.S. law enforcement agencies the authority Read more about Senators fail to stop new rules allowing US law-enforcement hacking[…]

Share

IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication

SecureAuth is in the business of adaptive access control. What that means in plain (or at least more plain) English is that the company offers security solutions that balance strength with ease of use and that adapt to different use cases. An example of adaptive access control might be requiring a simple username and password Read more about IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication[…]

Share

IDG Contributor Network: 8 security tips for retailers and consumers this holiday season

It’s the time of year for holiday cheer. Hot chocolate, cookies, presents and other festivities abound. Shops dress up their windows in exotic displays, and festive lights can be seen everywhere. Yes, it’s the time of year when everything is grander and everyone seems happier. But it’s not always sunshine and roses during the holiday Read more about IDG Contributor Network: 8 security tips for retailers and consumers this holiday season[…]

Share

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. The Global Network Initiative, a group that represents academics, investors, civil society organizations and companies including Facebook, Google and Microsoft, published Read more about Study warns of human rights risks from censoring online terror content[…]

Share

Wisconsin recount over suspected hacking will not be by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” The Wisconsin Read more about Wisconsin recount over suspected hacking will not be by hand[…]

Share

The new Mirai strain has gone far beyond Deutsche Telekom

The latest strain of Mirai, the malware that’s been infecting internet routers from Germany’s Deutsche Telekom, has spread to devices in at least 10 other countries, according to security firm Flashpoint. The company has detected the new Mirai strain infecting internet routers and modems across the globe, including in the U.K., Brazil, Iran and Thailand. Read more about The new Mirai strain has gone far beyond Deutsche Telekom[…]

Share

Isolation technologies create an “air gap” to eliminate the risk of malware

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Like the threat landscape itself, web gateways have changed over the years. Back in the 1990s, organizations primarily used them to prevent employees from wasting time surfing the web – or worse, from Read more about Isolation technologies create an “air gap” to eliminate the risk of malware[…]

Share

DARPA building space consortium to set standards for safe robotic maneuvers

DARPA next month will talk about a proposed consortium of industry players that will research, develop, and publish standards for safe commercial robotic servicing operations in Earth’s orbit. Specifically, DARPA said it wants to create the Consortium for Execution of Rendezvous and Servicing Operations or CONFERS that looks to establish a forum that would use Read more about DARPA building space consortium to set standards for safe robotic maneuvers[…]

Share

UK's internet surveillance law receives royal approval

Britons hoping that a quaint historical tradition might stop a Draconian internet surveillance law in its tracks were disappointed on Tuesday morning, when the Queen gave her approval to the Investigatory Powers Act 2016. In theory, the Queen has the power of veto over all U.K. legislation as bills do not become law until they Read more about UK's internet surveillance law receives royal approval[…]

Share

Goodbye SIEM, Hello SOAPA

Security Information and Event Management (SIEM) systems have been around for a dozen years or so.  During that timeframe, SIEMs evolved from perimeter security event correlation tools, to GRC platforms, to security analytics systems.  Early vendors like eSecurity, GuardedNet, Intellitactics, and NetForensics, are distant memories, today’s SIEM market is now dominated by a few leaders: Read more about Goodbye SIEM, Hello SOAPA[…]

Share

Amazon employee jumped from building after sending email to co-workers and CEO

An Amazon employee sent out an email to “hundreds” of his co-workers and even Amazon top dog CEO Jeff Bezos. Then he went to the roof of the building and jumped, attempting suicide. A spokesperson for the Seattle Fire Department told SeattlePI that a man did jump from the “rooftop at an Amazon building at Read more about Amazon employee jumped from building after sending email to co-workers and CEO[…]

Share
Share