Tuesday, March 19, 2019
The Security Ledger

Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow

In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O'Rourke of...
The Security Ledger

RSA Recap: CTO Zulfikar Ramzan talks about Trust, Zero Trust and the Debate over Going Dark

I talk with Zulfikar Ramzan, Chief Technology Officer (CTO) at RSA Security* about the major trends at this year's RSA Conference including the growing focus on digital risk and trust, the debate around encryption, law enforcement and "going dark"...
The Security Ledger

Whack-a-Fraud: EU’s Crackdown Could Increase U.S. Payments Scams

U.S. providers should be "on alert" for an increase in payments fraud experts warn. The European Union's (EU's) new Payment Services Directive (PSD2) raises the bar for security and may cause cybercriminals to focus on targets in this country. The...
The Security Ledger

Spotlight: CTIA’s IoT Cybersecurity Certification is a Big Deal. Here’s why.

Forget about Congress’s latest attempt to regulate IoT security. CTIAs new certification is the toothiest standard going. In this Spotlight Podcast, we talk with Sameer Dixit of Spirent* on the sidelines of RSA about why. The U.S. House of...
The Security Ledger

Pro-Brexit Camp Wages Active ‘Fake News’ Twitter Campaign

Suspicious activity on Twitter is trying to sway public opinion in favor of Brexit as the United Kingdom continues its struggle to reach a deal to withdraw from the European Union, according to a new report. The post Pro-Brexit Camp...
The Security Ledger

Podcast Episode 137 Sponsored by Code42: GirlScouts to the Rescue and Rethinking Enterprise DLP

In this week's episode (#137): Hewlett Packard Enterprise (HPE) Chief Information Security Officer Elizabeth Joyce joins us to talk about HPE's collaboration with Girl Scouts of America to bolster teenagers cyber security chops and encourage more young women to...
The Security Ledger

Report: China, Like Russia, Uses Social Media to Sway U.S. Public Opinion

Russia isn’t the only nation using social media sites like Facebook, Twitter and Instagram to spread its political message across in the United States; China also is using social media–albeit in different ways–to sway public opinion and make the...
The Security Ledger

For Customers, Backstory’s Lure is Data, Economics

Google spin-out Chronicle's new security intelligence service, Backstory, appeals to companies drowning in operational data and desperate for security insights, according to the companies who are using the platform. The post For Customers, Backstory’s Lure is Data, Economics appeared...
The Security Ledger

Devices’ UPnP Service Emerges as Key Threat to Home IoT Networks

Home connected device users are putting their IoT networks at risk by leaving exposed a common service devices use to seamlessly connect and communicate with each other, according to cybersecurity firm Trend Micro. Hackers recently have been found to...
The Security Ledger

Podcast Episode 136: The Geopolitics of Cyber Attacks with LookingGlass and Bruce Schneier on Public Interest Cyber

How will the collapse of the North Korean summit affect that country’s malicious activity online? LookingGlass* joins us to discuss. Also: how to attract more technologists to public interest work. Note: this week’s podcast episode (#136) is sponsored by...
The Security Ledger

At RSA: Focus on Cyber in the Public Interest

Congress, non profits and government agencies could all use technology and cyber security expertise. The RSA Conference is pondering what it will take to foster cyber security pros to work in the public interest. The post At RSA: Focus...
The Security Ledger

Following Security Ledger at RSA Conference: Monday

The Security Ledger will be in San Francisco for the 28th RSA Security Conference this week. Check us out if you're at the show or follow us on social media @securityledger or via the #SLRSA hash tag. I'll be...
The Security Ledger

Research: Sextortion Scams more frequent, sophisticated

So-called "sextortion" attacks are a growing threat, replacing other e-mail borne threats like spam, ransomware and business e-mail compromise attacks as they increase in sophistication and scope, a new report finds. The post Research: Sextortion Scams more frequent, sophisticated appeared...
The Security Ledger

Research finds Sextortion Scams Expand in Scope, Sophistication

So-called "sextortion" attacks are a growing threat, replacing other e-mail borne threats like spam, ransomware and business e-mail compromise attacks as they increase in sophistication and scope, a new report finds. The post Research finds Sextortion Scams Expand in Scope,...
The Security Ledger

Spotlight: Synopsys on democratizing Secure Software Development

We speak with Ravi Iyer, the Head of Product Management talks to us about the "democratization" of software development, as more and more companies become software publishers. Ravi and I talk about Polaris, a new software integrity platform that...
SC Magazine

Norwegian aluminum producer Norsk Hydro hit by an unspecified cyberattack

Norwegian aluminum producer Norsk Hydro was hit by a cyber attack which began Monday evening and escalated into the night. The Norwegian National Security Authority (NSM) declined to comment on what type of attack it was but said the extent...
SC Magazine

Glitch exposes Sprint customer data to other users

A bug has allowed some Sprint customers to see the personal data of other customers from their online accounts. The information visible includes names, cell phone numbers as well as calls made by other users and, and a Tech Crunch report cited...

6 Ways Mature DevOps Teams Are Killing It in Security

New survey shows where "elite" DevOps organizations are better able to incorporate security into application security.
The Register

Ransomware drops the Lillehammer on Norsk Hydro: Aluminium giant forced into manual mode after systems scrambled

Norway the power and metals wrangler could have seen this one coming Norwegian power and metals giant Norsk Hydro is battling an extensive ransomware infection on its computers.…

Old Tech Spills Digital Dirt on Past Owners

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.