US-CERT

Af2c9843333cc1e2578ddf18b3eed066

Health Insurance Firmly in the Crosshairs

March 23, 2015 Added by:Peter Zavlaris

Premera Blue Cross is the latest victim of what appears to be a long-term APT perpetrated by China. Between CHS, Anthem and now Premera Blue Cross, it’s now safe to say health insurance is firmly in the cross hairs of powerful nation state actors.

Comments  (1)

Af7244bb99debb4a1152fa49a993a05c

Crouching Yeti APT Actor Still Targeting Industrial Sectors: Kaspersky

March 18, 2015 Added by:Eduard Kovacs

The threat actor group known as Crouching Yeti, Energetic Bear and Dragonfly continues to target organizations across the world. However, experts believe the group has switched targets and infrastructure.

Comments  (9)

Bd07d58f0d31d48d3764821d109bf165

Taking Advantage of Critical Infrastructure Cybersecurity

March 18, 2015 Added by:Tripwire Inc

A key aspect of President Obama’s information sharing acts have been designed to encourage threat sharing to help protect the organizations and networks involved in critical infrastructure. However, while there are many advancements that still need to be made, there are strengths these networks have that can give defenders a strong footing.

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Grabbing Passwords from Memory using Procdump and Mimikatz

March 17, 2015 Added by:Dan Dieterle

When I was working on my Pulling Remote Word Documents from RAM using Kali Linux article, I was curious if you could use the same technique to pull the system passwords, and you can…

Comments  (6)

201d6e4b7cd0350a1a9ef6e856e28341

NAIC Cyber Security Principles – Not for Industrial Control Systems

March 17, 2015 Added by:Joe Weiss

There is still a significant gap in understanding of industrial control system (ICS) cyber security by many in the insurance industry.

Comments  (11)

0ead717779244d9aab5c1699308850d2

Clinton Email Server Vulnerable for 3 Months: Venafi

March 12, 2015 Added by:Brian Prince

Access to the personal email server used by former U.S. Secretary of State Hillary Clinton was not encrypted or authenticated by a digital certificate for the first three months of her term, research from security firm Venafi has found.

Comments  (6)

959779642e6e758563e80b5d83150a9f

It’s Friends and Family Breaching Patient Privacy – Not Estonian Hackers

March 12, 2015 Added by:Danny Lieberman

A 2011 HIPAA patient privacy violation in Canada, where an imaging technician accessed the medical records of her ex-husband’s girlfriend is illustrative of unauthorized disclosure of patient information by authorized people.

Comments  (1)

93c815429fc1ab15a9295a4f55989ae0

Decide What Starts Automatically On Your PC

March 10, 2015 Added by:Neohapsis

The old advice to disable the auto-play function in Windows is new again, so take a moment and go to Control Panel – AutoPlay and either change the AutoPlay options to “Take no action,” or disable the feature completely.

Comments  (2)

0ead717779244d9aab5c1699308850d2

Financial Malware Fell in 2014 As Takedown Operations Have Impact

March 05, 2015 Added by:Brian Prince

One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.

Comments  (15)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Joins Civil Society and Computer Security Experts to Call for Rejection of Flawed Cybersecurity Legislation

March 05, 2015 Added by:Electronic Frontier Foundation

EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA).

Comments  (6)

1c7e19555c747737c9064d29ea238f27

DARPA’S Memex Project Shines Light on the Dark Web

March 03, 2015 Added by:Robert Vamosi

To better combat the increasing use of the Dark Web for illegal purposes, DARPA, the U.S. military’s Defense Advanced Research Projects Agency, is building a search engine known as Memex for law enforcement use.

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

The Malicious Insider

March 03, 2015 Added by:Tripwire Inc

Financial gain or fraud was the primary driver of the 11,698 instances of insider privilege abuse – defined as any unapproved or malicious use of organization resources – in last year’s Verizon Data Breach Investigations Report.

Comments  (2)

201d6e4b7cd0350a1a9ef6e856e28341

Control System Cyber Security and the Insurance Industry

February 26, 2015 Added by:Joe Weiss

I have felt that the insurance companies can be a major player in driving the need to adequately secure control systems.

Comments  (7)

Default-avatar

Babar: Suspected Nation State Spyware In The Spotlight

February 25, 2015 Added by:Cyphort

Cyphort Labs has collected and analyzed a highly advanced piece of malware, which for all intents and purposes seems to be a full blown cyber espionage tool of the kind a nation state would be behind.

Comments  (7)

0ead717779244d9aab5c1699308850d2

Old Vulnerabilities Still Popular Targets for Hackers: HP

February 24, 2015 Added by:Brian Prince

According to the latest edition of Hewlett-Packard's Cyber Risk Report, 44 percent of known breaches in 2014 came from vulnerabilities that were between two and four years old.

Comments  (9)

Af7244bb99debb4a1152fa49a993a05c

Malicious Emails Can Cause Android Email App to Crash: Researcher

February 18, 2015 Added by:Eduard Kovacs

According to Hector Marco, a Spain-based security researcher, an attacker can remotely launch a denial-of-service (DoS) attack against a user by sending them a specially crafted email.

Comments  (5)

Page « < 1 - 2 - 3 - 4 - 5 > »