
New Amazon class certifies cloud pros in securing data on AWS
techrepublic.com - The AWS Certified Security - Specialty Exam could help tech professionals broaden their skills on the AWS platform.
hotforsecurity.bitdefender.com - Scammers are using a combination of phishing techniques and social engineering to trick people with Chinese last names into handing over their personal information and even make direct payments to the scammer. The scheme isn’t new, with reports going back as early as 2015 when the Federal Communi...
science.slashdot.org - Adam Frank, writing for The Atlantic: We're used to imagining extinct civilizations in terms of the sunken statues and subterranean ruins. These kinds of artifacts of previous societies are fine if you're only interested in timescales of a few thousands of years. But once you roll the clock back ...
tech.slashdot.org - yagoda shares a report from MIT Technology Review: Andreas Rossler at the Technical University of Munich in Germany and colleagues have developed a deep-learning system that can automatically spot face-swap videos. The new technique could help identify forged videos as they are posted to the web....
ask.slashdot.org - goombah99 writes: Hacking and Hackers get a bum rap. Headline scream "Every Nitendo switch can be hacked." But that's good right? Just like farmers hacking their tractors or someone re-purposing a talking teddy bear. On the other hand, remote hacking a Intel processor backdoor or looting medical...
ehackingnews.com - Accounts of more than a million clients may have been stolen by a former employee at SunTrust Banks, and now the company is working with law enforcement. "In conjunction with law enforcement, we discovered that a former employee while employed at SunTrust may have attempted to print information ...
bleepingcomputer.com - In the latest Redstone 5 skip ahead build for Windows 10 Insiders, Microsoft has added a hidden feature that enables a dark theme in File Explorer. While the new theme is in the very beginning development stages (hopefully!!), it's currently not a sight to behold.
tech.slashdot.org - Altaba, the company formerly known as Yahoo, will have to pay a $35 million fine for failing to disclose a 2014 data breach in which hackers stole info on over 500 million accounts. "The U.S. Securities and Exchange Commission announced today that Altaba, which contains Yahoo's remains, agreed to...
informationsecuritybuzz.com - The ISBuzz Post: This Post The Next WannaCry Is Coming … Are You Ready? appeared first on Information Security Buzz. Last year, we saw WannaCry take down the IT and operational technology (OT) systems of organisations across the world in every industry. While the motives behind WannaCry are sti...
braidwoodtimes.com.au - There has been a lot of talk lately in the media about phishing scams. Phishing is a way that criminals steal confidential information such as online banking logins, credit card details, business logins and passwords. Messages pretend to be from large organisations you can trust and are sent vi...
cryptovest.com - Cryptocurrency and blockchain technologies have become the fastest-growing areas of cybercrime. A review of research on criminal abuse of these technologies and criminal enterprises targeting digital currency exchanges has shown that cryptocurrency phishing and theft have emerged as the top chall...
informationsecuritybuzz.com - The ISBuzz Post: This Post Kaspersky Lab Identifies Infrastructure Of Crouching Yeti Known For Attacks On Industrial Companies appeared first on Information Security Buzz. Kaspersky Lab has uncovered infrastructure used by the well-known Russian-speaking APT group Crouching Yeti, also known as ...
securityaffairs.co - The researchers at CSE ZLab have spotted a new family of malware, tracked as Bandios spreading in the wild. The peculiarity of Bandios malware is the fact that this malware is in a rapid and constant evolution and development.
zdnet.com - The city of Atlanta, Georgia. (Image: file photo) Atlanta spent more than $2.6 million on recovery efforts stemming from a ransomware attack, which crippled a sizable part of the city's online services. The city was hit by the notorious SamSam ransomware, which exploits a deserialization vuln...
news.slashdot.org - Jason Kottke: As of 2015, only two women born in the 1800s and two others born in 1900 (the last year of the 19th century) were still alive. In the next two years, three of those women passed away, including Jamaican Violet Brown, the last living subject of Queen Victoria, who reigned over the Br...
nakedsecurity.sophos.com - John E Dunn has edited and written for numerous tech titles, including Techworld, Computerworld UK, Network Week, Network World, LAN Magazine, Personal Computer Magazine, start-up title Tornado-Insider Magazine, as well as churning out pessimistic blogs, freelance articles, and making glum appear...
apple.slashdot.org - The U.S. Supreme Court upheld an administrative review system that has helped Google, Apple and other companies invalidate hundreds of issued patents. From a report: The justices, voting 7-2, said Tuesday a U.S. Patent and Trademark Office review board that critics call a patent "death squad" was...
games.slashdot.org - Microsoft is rolling out a new Xbox One update that brings 1440p support for the Xbox One S and X, as well as support for AMD's FreeSync technology to allow compatible displays to sync refresh rates with Microsoft's consoles. A subsequent update in May will bring 120Hz-display refresh-rate suppor...
securityledger.com - We talk with Cisco Chief Privacy Officer Michelle Dennedy about her expectations for the May 25th deadline and what lies beyond it. Also: with the 2018 RSA Conference now in the history books, we invited Steve McGregory of Ixia talks about his big takeaways from the show.
yro.slashdot.org - More than 1 million children were victims of identity fraud in 2017, a new study from Javelin Strategy & Research found, costing a total of $2.6 billion. From a report: With limited financial history or existing account activity, children are the most likely to become victims of new-account f...
informationsecuritybuzz.com - The ISBuzz Post: This Post Five Reasons To Be Cheerful About GDPR appeared first on Information Security Buzz. Last year, the average UK small business spent 600 hours preparing for the upcoming GDPR. There are concerns that the new data protection regulation will impact productivity, prevent m...
cuinfosecurity.com - Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incid...
nakedsecurity.sophos.com - John E Dunn has edited and written for numerous tech titles, including Techworld, Computerworld UK, Network Week, Network World, LAN Magazine, Personal Computer Magazine, start-up title Tornado-Insider Magazine, as well as churning out pessimistic blogs, freelance articles, and making glum appear...
science.slashdot.org - Leading scientists have drawn up plans for a vast multinational European institute devoted to world-class artificial intelligence (AI) research in a desperate bid to nurture and retain top talent in Europe. From a report: The new institute would be set up for similar reasons as Cern, the particle...
ehackingnews.com - The U.S., Britain and Australia have accused the Russian government of maliciously targeting global internet equipment for political and economic espionage, stealing intellectual property and laying the foundation for an attack on infrastructure. Senior security officials in the US and UK hel...