Month: June 2017

ComputerWorldIndependent

The price of security is eternal phone calls

Credit to Author: Sharky| Date: Fri, 16 Jun 2017 03:00:00 -0700

This city government is going through an extended validation process with one of its IT security providers, according to a pilot fish in the loop.

“I got an email that said to call them, since they couldn’t reach me at the number they had,” fish says. “That’s no surprise, because the number isn’t mine — it’s our Human Resources main line.

“I’ve told them in the past to call me at my actual number for this, but they always insist that they need a ‘published’ number.”

After yet another round of this for the new security certification, fish calls customer support for the security outfit and suggests they replace the HR number with the number for the city’s IT department. That’s on the city’s official website, so it should qualify as “published.”

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

Know your community – Berend-Jan Wever (SkyLined / @berendjanwever)

Credit to Author: SSD / Maor Schwartz| Date: Thu, 15 Jun 2017 14:09:29 +0000

Aspiring ASCII artist, a chef, a gardener, bug bounty hunter and one of the leading browsers vulnerability researchers. Please meet Berend-Jan Wever AKA SkyLined! Questions Q: How many years have you been working in the security field? A: Probably about 30 years. My first experience in security was as a kid, when my computer got … Continue reading Know your community – Berend-Jan Wever (SkyLined / @berendjanwever)

Read More
ScadaICSSchneider

Building Cybersecurity Knowledge Is Critical First Step to Secure Industrial Networks

Credit to Author: Daniel Desruisseaux| Date: Thu, 15 Jun 2017 18:33:00 +0000

Cybersecurity is a critical topic for industrial control systems that will continue to accelerate in importance over the coming years.  Personnel working with industrial control systems everywhere in the world… Read more »

The post Building Cybersecurity Knowledge Is Critical First Step to Secure Industrial Networks appeared first on Schneider Electric Blog.

Read More
ScadaICSSchneider

Interxion and Schneider Electric Meet the Challenge: A State-of-the-Art Colocation Data Center Deployed in Just Two Months

Credit to Author: Greg Jones| Date: Thu, 15 Jun 2017 16:02:40 +0000

Success in the colocation and cloud computing markets often comes down to being in the right place at the right time. If you’ve got reliable, efficient data center capacity in… Read more »

The post Interxion and Schneider Electric Meet the Challenge: A State-of-the-Art Colocation Data Center Deployed in Just Two Months appeared first on Schneider Electric Blog.

Read More
MalwareBytesSecurity

Announcing Malwarebytes Endpoint Protection, a next-generation antivirus replacement for businesses

Credit to Author: Marcin Kleczynski| Date: Thu, 15 Jun 2017 15:00:07 +0000

Today, I am happy to announce Malwarebytes Endpoint Protection, its equivalent for businesses. Malwarebytes Endpoint Protection is an advanced threat prevention solution for Windows endpoints featuring a cloud-based management console, delivered through a unified endpoint agent.

Categories:

Tags:

(Read more…)

The post Announcing Malwarebytes Endpoint Protection, a next-generation antivirus replacement for businesses appeared first on Malwarebytes Labs.

Read More
IndependentKrebs

Inside a Porn-Pimping Spam Botnet

Credit to Author: BrianKrebs| Date: Thu, 15 Jun 2017 14:35:27 +0000

For several months I’ve been poking at a decent-sized spam botnet that appears to be used mainly for promoting adult dating sites. Having hit a wall in my research, I decided it might be good to publish what I’ve unearthed so far to see if this dovetails with any other research out there. In late October 2016, an anonymous source shared with KrebsOnSecurity.com a list of nearly 100 URLs that — when loaded into a Firefox browser — each displayed what appeared to be a crude but otherwise effective “counter” designed to report in real time how many “bots” were reporting in for duty. Here’s a set of archived screenshots of those counters illustrating how these various botnet controllers keep a running tab of how many “activebots” — hacked servers set up to relay spam — are sitting idly by and waiting for instructions.

Read More
ScadaICSSchneider

Simple Ways to Improve Hospital Efficiency – 3 Tips for Hospital Facility Managers

Credit to Author: Estelle Schweizer| Date: Thu, 15 Jun 2017 13:08:42 +0000

Rising energy costs. Tighter operating budgets. Staff spread thin and asked to do more with less. If you run a hospital, these operating constraints sound all too familiar. Facility managers… Read more »

The post Simple Ways to Improve Hospital Efficiency – 3 Tips for Hospital Facility Managers appeared first on Schneider Electric Blog.

Read More