Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System

October 23rd, 2014
by The Feeder
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System

Wyden spoke with WIRED about the difficulties of keeping mum on classified matters, about his public showdown with intelligence chief James Clapper over the NSA's data collection on Americans, and about the government's use of zero-day exploits.

The post Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System appeared first on WIRED.








Posted in Threat Level | Comments (0)

ISC StormCast for Thursday, October 23rd 2014 http://isc.sans.edu/podcastdetail.html?id=4205, (Thu, Oct 23rd)

October 23rd, 2014
by The Feeder
...(more)...

Posted in Uncategorized | Comments (0)

telnetd rulez: Cisco Ironport WSA Telnetd Remote Code Execution Vulnerability, (Wed, Oct 22nd)

October 22nd, 2014
by The Feeder

We received the following vulnerability advisory for a remote code execution vuln identified and ...(more)...

Posted in Uncategorized | Comments (0)

Open-Source Software Brings Bugs To Web Applications

October 22nd, 2014
by The Feeder
An average of eight severe security flaws from open-source and third-party code can be found in each web application, according to new findings from Veracode.

Posted in Uncategorized | Comments (0)

Pharmaceuticals, Not Energy, May Have Been True Target Of Dragonfly, Energetic Bear

October 22nd, 2014
by The Feeder
New research says the compromised companies were suppliers for OEMs that served pharma and biotech.

Posted in Uncategorized | Comments (0)

Insecure Protocol Puts 1.2M SOHO Devices At Risk

October 22nd, 2014
by The Feeder
Enterprises should take care to prohibit NAT-PMP traffic on untrusted network interfaces.

Posted in Uncategorized | Comments (0)

Cyber Threats: Information vs. Intelligence

October 22nd, 2014
by The Feeder
Cyber threat intelligence or CTI is touted to be the next big thing in InfoSec. But does it narrow the security problem or compound it?

Posted in Uncategorized | Comments (0)

This Fake Log Jams Your Phone So You’ll Shut Up and Enjoy Nature

October 22nd, 2014
by The Feeder
This Fake Log Jams Your Phone So You’ll Shut Up and Enjoy Nature

The Log Jammer blends into a natural setting to cut off that constant remote communication---to force people to experience the place they're in.

The post This Fake Log Jams Your Phone So You’ll Shut Up and Enjoy Nature appeared first on WIRED.








Posted in privacy, Threat Level | Comments (0)

ISC StormCast for Wednesday, October 22nd 2014 http://isc.sans.edu/podcastdetail.html?id=4203, (Wed, Oct 22nd)

October 22nd, 2014
by The Feeder
...(more)...

Posted in Uncategorized | Comments (0)

CVE-2014-6352 – Microsoft posts bulletin https://technet.microsoft.com/library/security/3010060 and quick “fix-it” https://support.microsoft.com/kb/3010060 . Look for a permanent fix in a future patch., (Tue, Oct 21st)

October 21st, 2014
by The Feeder
...(more)...

Posted in Uncategorized | Comments (0)