JudulBeritaDiposting
Former Scotland Yard detective discusses cymbercrime [sic] and threat intelligence

Steve Santorelli, passionate about Internet security and committed to
bringing folks together to attack the problem in many ways.
...
Having worked in the private, government and not-for-profit sectors,
from a cybersecurity perspective what are the advantages and challenge

Kamis, 02 Jun 2016
How You Can Set up Honeytokens Using Canarytokens to Detect Intrusions

A honeytoken is data or a computing resource that exists for the
purpose of alerting you when someone accesses it. This type of a
honeypot could take many form, such as a user account that no one should
use, a file that no one should access and a link on which no one should

Kamis, 02 Jun 2016
Student bypasses Valve’s review process, publishes game on Steam

That’s what Ruby Nealon, a 16-year-old computer science student at
University of Salford did: in order to prove that he discovered a couple
of review bypass bugs affecting Valve’s Steam platform, he leveraged
them to get some Steam Trading Cards approved, and to publ

Kamis, 02 Jun 2016
Troy investment company hacked; $495K stolen

"Police received a report on April 18 from the Pomeroy Investment Corp.
that an employee had received an email from another company worker
requesting the transfer of $495,000 to a Hong Kong bank.

Eight days later, the company determined the email was a fake designed

Kamis, 02 Jun 2016
Universities aren’t doing enough to train the cyberdefenders America desperately needs

"None of America's top 10 computer science programs -- as ranked by U.S.
News & World Report in 2015 -- requires graduates to take even one
cybersecurity course, according to a new analysis from security firm
CloudPassage.

Three of the 10 top-ranked programs

Kamis, 02 Jun 2016
EU approves new data protection rules

Members of the European Parliament have given their final approval for
the new General Data Protection Regulation (GDPR).

Parliament’s vote ends more than four years of work on a complete
overhaul of EU data protection rules. The reform will replace the
current dat

Rabu, 01 Jun 2016
How To Prepare For A DDoS Attack: 10 Steps

Distributed denial of service (DDoS) attacks are scary. In a matter of
minutes, they can shut down a network, service or website, costing
companies millions of dollars.

A recent study by Corero Network Security found that while 34 percent of
IT managers surveyed cited lo

Rabu, 01 Jun 2016
Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock Doors and Set Off Fire Alarms

Now one group of researchers at the University of Michigan and
Microsoft have published what they call the first in-depth security
analysis of one such “smart home” platform that allows anyone to control
their home appliances from light bulbs to locks with a PC or sm

Rabu, 01 Jun 2016
The Security of Things Forum 2016 Call For Submissions

The Security of Things Forum 2016 (SECoT 2016) is soliciting
submissions for the third annual SECoT Forum to be held at the Sheraton
Commander Hotel in Cambridge, MA September 22, 2016. Use the form
provided to submit your talk, presentation or research for inclusion in
ou

Rabu, 01 Jun 2016
Rooting the Amazon Echo

"tl;dr - The Amazon Echo looks for an external SD card when it boots up.
If you format one correctly and attach it in the way that I describe,
the Echo will boot from your card and then you can access the Echo
filesystem by mounting the internal eMMC card. This will allow f

Rabu, 01 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: