INFOSECURITY NEWSLETTER

November 29, 2017

[Webinar] Flying Blind: 2017 Cloud Configurations Gone Wrong

In this webinar, we’ll take a look at 2017 cloud data breaches: what went wrong and how to avoid the same fate. What are some of the telltale signs a misconfiguration is going to put your critical assets at risk? How can you avoid a misconfiguration in the future? Join our team of cloud security experts for a 45-minute webinar to learn more about the steps you can take to improve your cloud security posture and keep your critical information protected.

Save Your Seat

Why You’ll Never Succeed at Selecting an MSSP (Without These Questions)

Ryan Clancy, deltarisk.com, November 21, 2017

Managed security services providers (MSSPs) have risen in popularity. The new report, “Security Advisory Services Market by Service Type – Global Forecast to 2022,” indicates that the security advisory services market is expected to grow nearly 20 percent annually from USD $5.77 billion in 2017 to USD $13.57 billion by 2022.

Read More


Ransomware Attack Involving Scarab Malware Sends Over 12M Emails in 6 Hours

Waqas Amir, hackread.com, November 28, 2017

Security researchers at the Austin based Anti-virus software firm Forcepoint have discovered a massive spam ransomware campaign in which the Scarab malware destroys all your files if you don’t pay the ransom, which is asked in Bitcoin. The campaign was started on 23rd November while attackers have used the largest email spam botnet on the internet called Necurs for distributing malicious emails.

Read More

What Amazon Echo and Google Home Do With Your Voice Data, Contracting Investigation

Brian Barrett, wired.com, November 24, 2017

Amazon Echo and Google Home—and other devices that have Alexa and Google Assistant built in—are some of the most promising new technologies to come along in years. And they’re genuinely useful to have around, whether it’s to settle a bet or help out with a recipe. But it can also feel a little creepy to have a speaker in your house that’s always listening. What exactly is it doing with that info? Where does it go?

Read More

60 Cybersecurity Predictions For 2018

Gil Press, forbes.com, November 26, 2017

Like death and taxes, there are only two safe predictions about cybersecurity in 2018: There will be more spectacular data breaches and the EU General Data Protection Regulation (GDPR) will go into effect on May 25. But as the continuing digital transformation of our lives entails the ongoing digital transformation of crime, vandalism and warfare, 2018 could also bring a lot of new takes on old vulnerabilities, some completely new types of cyberattacks, and successful new defenses.

Read More

The Future of Cybersecurity Is in High-Speed Quantum Encryption

Dom Galeon, futurism.com, November 26, 2017

The advent of functioning quantum computers has been considered to present a threat to today’s encryption methods. On the other hand, these quantum systems might hold the key to keeping computers and the internet secure, thanks to quantum cryptography. A team of researchers from Duke University, Ohio State University, and Oak Ridge National Laboratory have tackled quantum encryption on a whole new scale.

Read More

Critical Flaws in Intel Processors Leave Millions of PCs Vulnerable

Swati Khandelwal, thehackernews.com, November 21, 2017

In past few months, several research groups have uncovered vulnerabilities in the Intel remote administration feature known as the Management Engine (ME) which could allow remote attackers to gain full control of a targeted computer. Now, Intel has admitted that these security vulnerabilities could “potentially place impacted platforms at risk.”

Read More

Georgia’s $60M Cybersecurity Training Center ‘Topped Out’

Joe Hotchkiss, govtech.com, November 17, 2017

Local and state officials Thursday ceremonially “topped out” the steel frame of a $60 million cybersecurity training center scheduled to open next July. Workers on the Hull McKnight Georgia Cyber Innovation and Training Center actually put the final steel beam in place, on the highest point of the mid-rise building, Nov. 10. But Thursday’s gathering more formally recognized the progress of the facility, including a barbecue lunch to thank the project’s work crews.

Read More

Should You Risk Buying Your Child Smart Toys Currently on Offer?

Zeljka Zorz, helpnetsecurity.com, November 27, 2017

As the end-of-the-year holiday season approaches, many security researchers, consumer groups and even governments warn against buying specific products or, at least, to make an effort read up about potential risks before buying them.In the last year or so, security researchers have tested many smart toys, and found them wanting in the security and privacy department. Even the FBI is making an effort to educate consumers about the potential dangers of such toys.

Read More

The Key to Better Cybersecurity: Keep Employee Rules Simple

Maarten Van Horenbeeck, hbr.org, November 21, 2017

It’s a common adage that employees are the weak link in corporate cybersecurity. But I believe they are also the best defense, if they are given policies that are easy to follow and not too numerous and complex. Employee security training and best practices need to be user friendly and simple to be effective.

Read More
financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th


top cyber incident pain points