Month: March 2017

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 27, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 03 Mar 2017 16:42:53 +0000

“Every new beginning comes from some other beginning’s end.” That’s the last line of the song “Closing Time” by the band Semisonic. The TippingPoint team is no stranger to new beginnings. Our latest “new beginning” began almost a year ago when Trend Micro acquired us from Hewlett Packard Enterprise. The second part of our new…

Read More
FortinetSecurity

Byline: Is Your Healthcare Data Safe? Three Questions to Ask

Credit to Author: Susan Biddle| Date: Fri, 03 Mar 2017 07:20:08 -0800

In the all-out war for data, the healthcare industry is getting hit the hardest. Experian’s fourth annual 2017 Data Breach Industry Forecast states that healthcare organizations will be the most targeted sector for attack, with new and sophisticated attacks emerging. If healthcare organizations and their IT teams aim to keep data safe, they need to take a step back to assess the overall security landscape and the security processes currently in place on a macro level.

Read More
ComputerWorldIndependent

Pence used private mail for state work as governor; account was hacked

Credit to Author: John Ribeiro| Date: Fri, 03 Mar 2017 03:06:00 -0800

U.S. Vice President Mike Pence reportedly used a private email account to transact state business when he was governor of Indiana, and his AOL account was hacked once, according to a news report.

Emails released to the Indianapolis Star following a public records request are said to show that Pence used his personal AOL account to communicate with his top advisers on issues ranging from security gates at the governor’s residence to the state’s response to terror attacks across the globe.

A hacker seems to have got access to his email account in June, and sent a fake mail to people on the former governor’s contact list, claiming that Pence and his wife had been attacked on their way back to their hotel in the Philippines, according to the report. Pence subsequently changed his AOL account.

To read this article in full or to leave a comment, please click here

Read More
MicrosoftSecurity

Breaking down a notably sophisticated tech support scam M.O.

Credit to Author: msft-mmpc| Date: Fri, 03 Mar 2017 05:39:41 +0000

The cornerstone of tech support scams is the deception that there is something wrong with your PC.  To advance this sham, tech support scams have long abused browsers’ full screen function. Coupled with dialogue loops, the pop-up messages that just won’t go away, and the spoofing of brands like Microsoft, tech support scam websites can…

Read More
ComputerWorldIndependent

Slack bug paved the way for a hack that can steal user access

Credit to Author: Michael Kan| Date: Thu, 02 Mar 2017 12:36:00 -0800

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick users into handing over access to their accounts.

Bug bounty hunter Frans Rosen noticed he could steal Slack access tokens to user accounts due to a flaw in the way the application communicates data in an internet browser.

“Slack missed an important step when using a technology called postMessage,” Rosen said on Wednesday in an email.  

PostMessage is a kind of command that can let separate browser windows communicate with each other. In Slack, it’s used whenever the chat application opens a new window to enable a voice call.

To read this article in full or to leave a comment, please click here

Read More