Cybersecurity Fantasy Role-Playing Game

It’s called Cryptomancer. Think computer hacking plus magic. I know nothing about it, but it feels reminiscent of Shadowrun. Reddit thread. RPG.net thread. Source: schneier sec blog

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Tackle Insider Threats Head-On By Building A Proactive Security Culture

More than 40% of data loss is caused by company insiders. Use this white paper to find ways your company can reduce the chance of internal data loss by fostering a trusted security culture, creating employee profiles and more. Then, discover a security program that offers a myriad of protections from insider threats. Published by: Intel Security Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Transform Data Risk Into Business Reward

Learn how, in the face of changing laws, unsecure cloud apps, and worrying cybercrime techniques, you can protect your data. Discover what must be done to remain compliant, secure, and maximize the benefits of the resources available to you. Published by: Blue Coat Systems Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Discover the Cloudification of Healthcare IT

The path to cloud has not been without hurdles, raising issues such as: Is clinical data safe? Is the platform compliant? Access this post to hear what other IT executives have to say about the cloudification of healthcare IT, and their respective decisions to adopt, or not adopt, cloud platforms. Published by: Pure Storage Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Sustainable Security Operations: Optimize Processes and Tools to Make the Most of Your Team's Time and Talent

In this white paper, learn about a program that takes your threat management protocols from a reactive to a proactive, while reducing complexity and improving operational effectiveness. Access now and discover how you can integrate separate security procedures, automate threat warnings, increase security accuracy with behavioral analytics, and more Published by: Intel Security Source: sec news whitepapers

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Researchers Point Out 'Theoretical' Security Flaws In AMD's Upcoming Zen CPU

An anonymous reader writes from a report via BleepingComputer: The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, according to two German researchers. The technology, called Secure Encrypted Virtualization (SEV), is designed to encrypt parts of the memory shared by different virtual machines on cloud servers. AMD, who plans to ship SEV with its upcoming line of Zen processors, has published the technical documentation for the SEV technology this pastRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

How To Enable Two-Factor Authentication on Gmail and Google

For the first few days of the 12 Days of 2FA, we’ll focus on two-factor authentication for email. When you forget or lose your password, services will often email you to confirm your identity and reset it. This makes email the golden key to all of your other online accounts. If your email password is compromised with no second layer of authentication to back it up, an attacker can easily access your other accounts in a domino effect. You can enable 2FA for your Gmail account on Google’s single settingsRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Friday Squid Blogging: Electronic Screens Inspired by Squid

Squid-inspired electronic screens. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Source: schneier sec blog

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

DHS Tried To Breach Our Firewall, Says Georgia's Secretary of State

An anonymous reader quotes a report from CyberScoop: Georgia’s secretary of state has claimed the Department of Homeland Security tried to breach his office’s firewall and has issued a letter to Homeland Security Secretary Jeh Johnson asking for an explanation. Brian Kemp issued a letter to Johnson on Thursday after the state’s third-party cybersecurity provider detected an IP address from the agency’s Southwest D.C. office trying to penetrate the state’s firewall. According to the letter, the attempt was unsuccessful. The attempt took place on Nov. 15, a few days afterRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

IBM's Watson for Cybersecurity puts a new face on machine learning

The IBM Watson for Cybersecurity beta program aims to augment human intelligence, but experts question if IBM can distinguish it from other machine learning products. Source: security news daily

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Twitter Cuts API Access For Media Sonar, Spy Tool Used To Target Black Lives Matter

Police have now one less tool to monitor users on Twitter. The Daily Dot is reporting that Twitter has cut ties with a third-party social network surveillance firm, citing company policies intended to safeguard users against the surreptitious collection of data by law enforcement agencies. From the report: The severed contract follows Twitter nullifying the commercial data agreements of two other leading social-network-surveillance firms, Geofeedia and Snaptrends. Previously unreported, Twitter severed the access of Media Sonar, an Ontario-based company founded in 2012, which has sold surveillance software to police departmentsRead More

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Experts unsure if cyber attribution research will yield results

Georgia Tech received a contract to research the science of cyber attribution, but experts disagree on whether it is possible to succeed in this endeavor. Source: security news daily

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Obama Orders Inquiry Into Cyberattacks On Democratic Party Websites

President wants U.S. intelligence to provide report before he leaves office Jan. 20. Source: dark reading attack

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

How one man could have set loose a Yahoo Mail virus

Last year, Jouko Pynnönen scored $10k from Yahoo for helping it head off the risk of a Yahoo-wide email virus. This year… same again. Source: nakid security

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

News in brief: Mounties drop bodycam plans; vibrator firm to settle lawsuit; Samsung to brick Note 7s

Your daily round-up of what else is in the news Source: nakid security

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Enigma Machine Sold for Almost Half a Million Dollars

A fully functional four-rotor Enigma machine sold for $463,500. Wow. Source: schneier sec blog

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Admin spied on Expedia executive emails to make share killing

Former staffer to pay $375,000 in restitution and faces sentencing in February Source: nakid security

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Ransomware Gives Free Decryption Keys to Victims Who Infect Others

Researchers say they have uncovered a ransomware sample that is still under development that comes with a novel and nasty twist. Infected victims of the ransomware, known as Popcorn Time, have the option to either pay-up or they can opt to infect two others using a referral link. If the two new ransomware targets pay […] Source: threatpost

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Windows XP ‘still widespread’ among healthcare providers

Using XP a security risk and could also breach HIPAA, warn experts Source: nakid security

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  

Russian Authorities Make Arrests In Wake Of Central Bank Cyberattack

Arrests in the $19-million theft were made in a joint operation by FSB and Interior Ministry, says central bank official. Source: dark reading attack

Spread the love
  •  
  •  
  •  
  •  
  •  
  •