Thousands of TP-Link routers are vulnerable to a bug that can be used to remotely take control the device, but it took over a year for the company to publish the patches on its website.
Ubuntu Security Notice USN-3566-2
May 22, 2019
Ubuntu Security Notice USN-3993-1
May 22, 2019
• AI, biometrics, IOT, drones, cybercrime, home and business security products and services to launch at IFSEC
• F1 leader Valtteri Bottas on Abloy stand as brand ambassador
• IFSEC International / 18-20 June / ExCeL London
By The Recorded Future Team on May 17, 2019
This is the first blog in a three-part series where we’ll examine how security teams manage incident response processes. Here, we’ll highlight the challenges that security teams face when trying to mitigate incidents and how constraints force many teams into taking a reactive approach. This leads to incident response teams feeling the stress of scrambling to protect their business operations and related digital assets. We’ll also explain how threat intelligence can give security teams what they need to take a more proactive approach, enabling them to better prepare for threats and prioritize their mitigation efforts.
Written by Bernard Parsons, founder and CEO of Becrypt
KnowBe4, the provider of the world’s largest security awareness training (SAT) and simulated phishing platform, today announced the acquisition of CLTRe —pronounced “Culture”— a Norwegian company focused on helping organisations assess, build, maintain and measure a strong security posture. CLTRe will continue to operate as an independent subsidiary of KnowBe4, and service customers globally. CLTRe’s Toolkit and Security Culture Framework will be available to all KnowBe4 customers later this year.
ExtraHop, provider of enterprise cyber analytics from the inside out, today launched the ExtraHop for IBM QRadar app, which integrates with IBM Security Intelligence technology to stream accurate, contextual network behavioural detections into the QRadar SIEM. With Reveal(x) detections in QRadar, organisations have a complete picture of suspicious or anomalous behaviour on their network, as well as the ability to perform rapid, guided investigations. This bi-directional integration lets analysts move back to ExtraHop to explore forensic detail captured from network data.
TrustArc, a leading data privacy management company, today announced new findings from an online study conducted by Ipsos MORI, a global research and consulting firm, on behalf of TrustArc. The survey polled individuals aged 16-75 in the UK about a number of issues surrounding the EU General Data Protection Regulation (GDPR) one year since it went into effect on 25 May 2018.
The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate. Or the car you may be driving. But more than anywhere else, you’ll see IoT at home in an increasing array of gadgets: from voice-activated smart speakers to internet-connected baby monitors.
By: Andrew Clarke, director of strategic alliances & channel partnerships, One Identity.
The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result.
Third-party risk management is an issue that keeps many chief information security officers (CISOs) and other security leaders awake at night. Third-party risk has a lot more in common with phishing than advanced persistent threats (APTs) or zero-day attacks; it’s a known issue, but there’s a huge gap between awareness and risk at the majority of organizations. There’s no shortage of reasons to get this one right, including mounting compliance pressures and the tenuous state of customer trust.
Disclaimer: This post is for people who don’t like to be watched or tapped. Is that paranoid?
Hikvision and Dahua Technology which produce audio-visual equipment that can be used for surveillance were specifically cited in a letter to Trump’s top advisers last month, signed by more than 40 lawmakers. The lawmakers said China’s actions in its western region of Xinjiang “may constitute crimes against humanity” and urged tighter U.S. export controls to ensure that U.S. companies are not assisting the Chinese government’s crackdown there.
For years, the web has been largely free thanks to online ads. The problem is that nobody likes them. When they’re not obnoxiously taking over your entire screen or autoplaying, they’re tracking you everywhere you go online.
Acting Secretary of Homeland Security Kevin K. McAleenan met with the Homeland Security Advisory Council (HSAC) to discuss a range of homeland security issues and his priorities for the Department. The Acting Secretary then swore in two new members to the HSAC, Robert Bonner and Leon Fresco.
Transport for London will roll out default wi-fi device tracking on the London Underground this summer, following a trial back in 2016.
Regulatory requirements such as the General Data Protection Regulation (GDPR) and high-profile breaches have moved cybersecurity out of IT and into the board room. For security practitioners, this level of visibility has helped ease the budgeting process and allowed them to add multiple products and services to their security solutions toolkits.
Indonesia is the latest nation to hit the hammer on social media after the government restricted the use of WhatsApp and Instagram following deadly riots yesterday.