Page 2 of 60

SOCs Use Automation to Compensate for Training, Technology Issues

Executives and front-line SOC teams see human and technology issues in much different ways, according to two new reports.

Here come the first blockchain smartphones: What you need to know

After months of speculation, Taiwanese electronics company Huawei Technologies Ltd. (HTC) has confirmed it will be releasing a blockchain-enabled smartphone this year that will allow users to securely store cryptocurrency offline and act as a compute node in a blockchain network.

"We want to double and triple the number of nodes of Ethereum and Bitcoin," HTC said in its marketing material for the device. The new smartphone is expected to be able to work with multiple blockchain protocols allowing for interoperability between them.

In addition, the HTC Exodus blockchain-enabled smartphone will allow owners to play CryptoKitties, a decentralized app (Dapp) game. Dapps are applications that run across multiple nodes on peer-to-peer (P2P) networks.

To read this article in full, please click here

WordPress Sites Targeted in World Cup-Themed Spam Scam

Spammers using a 'spray & pray' approach to post comments on WordPress powered blogs, forums, says Imperva.

What’s Cooking With Caleb Sima

Security Pro File: Web app security pioneer dishes on his teenage security career, his love of electric scooters, Ace Ventura - and a new baby food business venture with his wife and famed chef, Kathy Fang.

Google flips switch on Chrome’s newest defensive technology

Google has switched on a defensive technology in Chrome that will make it much more difficult for Spectra-like attacks to steal information such as log-on credentials.

Called "Site Isolation," the new security technology has a decade-long history. But most recently it's been cited as a shield to guard against threats posed by Spectre, the processor vulnerability sniffed out by Google's own engineers more than year ago. Google unveiled Site Isolation in late 2017 within Chrome 63, making it an option for enterprise IT staff members, who could customize the defense to shield workers from threats harbored on external sites. Company administrators could use Windows GPOs - Group Policy Objects - as well as command-line flags prior to wider deployment via group policies.

To read this article in full, please click here

Lessons from My Strange Journey into InfoSec

Establishing an entree into the security world can be a maddeningly slow process. For those of us already here, it can be can be an opportunity to help others.

ICS Security: ‘The Enemy Is in the Wire’

Threats to industrial control systems are real and frightening. The government is taking steps to keep us safer in the future, but there are near-term steps you can take right now.

Timehop Releases New Details About July 4 Breach

Additional information includes PII affected and the authentication issue that led to the breach.

Ukraine Security Service Stops VPNFilter Attack at Chlorine Station

The facility's process control system and emergency-detection system were infected, Interfax Ukraine reports.

Ukraine Security Service Stops VPNFilter Attack at Chlorine Station

The facility's process control system and emergency-detection system were infected, Interfax Ukraine reports.