May 10, 2017

Userfeeds Aims to Stop Fake News by Linking the Blockchain to Social Content

Mike Butcher,, May 3, 2017

Userfeeds is a new startup which has a platform which applies blockchain tokens to news discovery. The idea is to combat so-called “fake news” by providing an economic incentive to rank content well. The Warsaw based company has raised $800k in seed funding from BlueYard Capital, Fred Ehrsamh (the Coinbase co-founder) and Piotr Smolen ( Dataventures ).

Read More

Cyber Handyman Skill #2: How to Scan Your Network with Nmap

Matthew Kuznia,, May 5, 2017

Two weeks ago, we introduced our “5 DIY Cyber Security Skills Every IT Professional Needs to Master” blog series. I discussed the first skill on the list, using virtual machines (VMs), and why they’re practically indispensable for simplifying day-to-day security tasks. Today, I’ll explain the importance of the network mapper, also known as nmap — a critical command line tool that improves network visibility and overall security.

Read More

Fraudsters Draining Accounts with SIM Swaps — What to Do

Paul Ducklin,, May 2, 2017

Have you ever lost your mobile phone? If so, you already know that your mobile provider will happily sell you a new phone and give you a brand new SIM card to activate the handset. Lo and behold, when you fire up the new phone, it has your old number, so you don’t need to give all your friends and colleagues a new one.

Read More

GDPR Requirements: Five High-Priority Actions

Help Net Security Staff,, May 3, 2017

The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on May 25, 2018. Gartner predicts that by the end of 2018, more than 50 percent of companies affected by the GDPR will not be in full compliance with its requirements.

Read More

False Positives Still Cause Threat Alert Fatigue

Ryan Francis,, May 3, 2017

It is commonly referred to as information overload. An infosec professional throws out a wide net in hopes of stopping malware before it gets too deep into the network, but like a motion-sensor light, sometimes the alert catches a squirrel instead of a burglar. Rob Kerr, chief technology officer at Haystax Technology, cited the 2013 breach at Target, as an example in which thieves stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers.

Read More

Super Free Music Player in Google Play is Malware: a Technical Analysis

Bill Brener,, May 2, 2017

Take a good look at this find in Google Play. It goes by the name Super Free Music Player and has so far attracted between 5,000 and 10,000 downloads. Now that you’ve had a good look, take our advice and don’t download it. It’s malware.According to SophosLabs researcher Rowland Yu, the application was uploaded to Google Play on March 31, and uses sophisticated techniques formerly found in BrainTest malware to bypass detection by Google and security researchers.

Read More

Making Sense of Cybersecurity Qualifications

Stacy Collett,, May 3, 2017

IBM’s cybersecurity division has hired nearly 2,000 professionals to its security team since 2015. Leaders recognize that the skills needed to succeed don’t always come in the form of a traditional degree, but “the sheer volume of new certifications being created does pose challenges,” says Diana Kelley, global executive security adviser.

Read More

Include Lawyers in Cybersecurity Incident Response Planning, Forrester Says

Bill Siwicki,, May 2, 2017

Healthcare and other organizations must engage legal help to aid their CEOs in making smart decisions and improving breach responses, according to a recent report by Forrester Research. “The welfare of the business and the investment of its shareholders ultimately resides with the CEO,” the report stated.

Read More

Small Budgets Cripple Cybersecurity Efforts of Local Governments

Dark Reading Staff,, May 3, 2017

A survey of local government chief information officers finds that insufficient funding for cybersecurity is the biggest obstacle in achieving high levels of cyber safety. Inadequate budgets are the largest obstacle for local government chief information officers in obtaining the highest level of cybersecurity for their organization, according to a survey released today by the International City/County Management Association.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

top cyber incident pain points