JudulPenulisKutipanDiposting
New Device Sold on the Dark Web Can Clone Up to 15 Contactless Cards per SecondCatalin Cimpanu, SoftpediaA criminal group going under the name of The CC Buddies is selling a hi-tech device on the Dark Web that's capable of copying details from contactless debit cards if held as close as eight centimeters away from a victim's card. ...Selasa, 28 Jun 2016
Netgear Router Update Removes Hardcoded Crypto KeysMichael Mimoso, ThreatPost (Kaspersky Lab Blog)Netgear on Friday released firmware updates for two of its router products lines, patching vulnerabilities that were reported six months ago. .....Selasa, 28 Jun 2016
IT threats during the 2016 Olympic Games in Brazil Dmitry Bestuzhev, Fabio Assolini and Thiago Marques, SecureList (Kaspersky Lab Blog)Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and to those planning to watch it online. ....Selasa, 28 Jun 2016
IRS Re-Enables ‘Get Transcript’ FeatureBrian Krebs, KrebsOnSecurityThe Internal Revenue Service has re-enabled a service on its Web site that allows taxpayers to get a copy of their previous year’s tax transcript. The renewed effort to beef up taxpayer authentication methods at irs.gov comes more than a year after the agency disabled the transcript service because tax refund fraudsters were using it to steal sensitive data on consumers. .....Selasa, 28 Jun 2016
‘Guccifer 2.0’ claims credit for DNC hackEllen Nakashima, The Washington PostOn Wednesday, an individual going by the handle Guccifer 2.0 claimed credit for the hacking of the Democratic National Committee’s network, though a cybersecurity firm investigating the breach stood by its conclusion that Russia was behind the breach. ....Selasa, 28 Jun 2016
Report: FBI Doing Poor Job Securing 411 Million Facial Recognition PhotosChris Brook, ThreatPost (Kaspersky Lab Blog)Privacy experts are arguing this week the FBI, which maintains a vast – and apparently even larger than expected – treasure trove of facial recognition photos, isn’t doing enough to safeguard the databases, many which contain images of innocent citizens. ....Senin, 27 Jun 2016
InfoSec 2016: Lord Hague says there is no "absolute right to privacy"Roi Perez, SC MagazineLord Hague says there is no "absolute right for privacy" in our modern digital lives while encouraging partnerships between government and business. ....Senin, 27 Jun 2016
Apple looks into the benefits of differential privacyNarinder Purba, WeLiveSecurity (ESET Blog)Differential privacy is going to be key to how Apple collects, stores and uses data, the tech giant revealed during its Worldwide Developers Conference. ....Senin, 27 Jun 2016
U.S. sees progress in latest cyber talks with ChinaReutersThe United States is pleased to see progress has been made with China on information sharing about cyber threats, a senior U.S. official said on Tuesday during the latest round of cyber security talks between the two countries. ....Senin, 27 Jun 2016
Handling Code of Conduct and Acceptable Computer Usage ViolationsKevin Beaver, Security Intelligence (IBM Blog)Long ago, I spoke about employee monitoring, exploring the topic of monitoring employee and computer usage violations. What was a popular and challenging topic over a decade ago has seemingly become a nonissue in the corporate world today. .....Senin, 27 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: