another

Pokémon GO Spam, Ransomware, On the Rise

August 17, 2016 , 12:58 pm

Cisco Begins Patching Equation Group ASA Zero Day

August 24, 2016 , 5:53 pm

Yahoo Challenged on Claims Breach Was State-Sponsored Attack

September 29, 2016 , 2:15 pm

OpenSSL Fixes Critical Bug Introduced by Latest Update

September 26, 2016 , 10:45 am

500 Million Yahoo Accounts Stolen By State-Sponsored Hackers

September 22, 2016 , 3:47 pm

Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials

September 22, 2016 , 12:31 pm

Experts Want Transparency From Government’s Vulnerabilities Equities Process

September 20, 2016 , 2:41 pm

Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure

September 15, 2016 , 11:15 am

Generic OS X Malware Detection Method Explained

September 13, 2016 , 9:14 am

Patched Android Libutils Vulnerability Harkens Back to Stagefright

September 9, 2016 , 2:06 pm

Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017

September 8, 2016 , 3:43 pm

Threatpost News Wrap, September 2, 2016

September 2, 2016 , 9:00 am

Insecure Redis Instances at Core of Attacks Against Linux Servers

September 1, 2016 , 1:08 pm

Dropbox Forces Password Reset for Older Users

August 29, 2016 , 9:58 am

New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption

August 24, 2016 , 8:00 am

Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

August 17, 2016 , 4:06 pm

ProjectSauron APT On Par With Equation, Flame, Duqu

August 8, 2016 , 1:40 pm

Miller, Valasek Deliver Final Car Hacking Talk

August 4, 2016 , 3:26 pm

Researchers Go Inside a Business Email Compromise Scam

August 4, 2016 , 10:00 am

Export-Grade Crypto Patching Improves

August 3, 2016 , 10:00 am

Kaspersky Lab Launches Bug Bounty Program

August 2, 2016 , 9:00 am

Threatpost News Wrap, July 29, 2016

July 29, 2016 , 10:45 am

KeySniffer Vulnerability Opens Wireless Keyboards to Snooping

July 26, 2016 , 9:30 am

Upcoming Tor Design Battles Hidden Services Snooping

July 25, 2016 , 3:51 pm

EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers

July 21, 2016 , 1:18 pm

Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update

July 20, 2016 , 9:21 am

Threatpost News Wrap, July 15, 2016

July 15, 2016 , 11:00 am

Academics Build Early-Warning Ransomware Detection System

July 14, 2016 , 1:05 pm

xDedic Hacked Server Market Resurfaces on Tor Domain

July 12, 2016 , 11:40 am

Conficker Used in New Wave of Hospital IoT Device Attacks

June 30, 2016 , 11:48 am

655,000 Healthcare Records Being Sold on Dark Web

June 28, 2016 , 10:00 am

Windows Zero Day Selling for $ 90,000

May 31, 2016 , 5:44 pm

Millions of Stolen MySpace, Tumblr Credentials Being Sold Online

May 31, 2016 , 1:37 pm

OTR Protocol Patched Against Remote Code Execution Flaw

March 10, 2016 , 10:23 am

Critical MySQL Vulnerability Disclosed

September 12, 2016 , 11:00 am

Keystroke Recognition Uses Wi-Fi Signals To Snoop

August 25, 2016 , 2:19 pm

PLC-Blaster Worm Targets Industrial Control Systems

August 5, 2016 , 4:49 pm

Android Patch Fixes Nexus 5X Critical Vulnerability

September 2, 2016 , 12:49 pm

WordPress Update Resolves XSS, Path Traversal Vulnerabilities

September 8, 2016 , 12:23 pm

Browser Address Bar Spoofing Vulnerability Disclosed

August 17, 2016 , 12:54 pm


Threatpost | The first stop for security news

Plans are afoot in Westminster to burn even more taxpayers' cash by launching a new cyber-security startup accelerator in Cheltenham.

The accelerator will be the umpteenth vehicle for funnelling money to muppets since the coalition government came to power.

Other accelerators have included a military technology free-money haus opened in July, and Vince Cable's hipster tech creche with the Urban Innovation Centre last year.

Today, with bells and whistles, the Department for Culture, Media and Sport declared that it has teamed up with “GCHQ and the nation’s top tech start-ups to develop new technologies aimed at protecting the UK from cyber attacks.”

There are several groups which aim to protect the UK from cyber attacks, not least among them the UK's signals intelligence and surveillance agency, which receives billions in funding from the Single Intelligence Account budget every year.

According to a recent report from the National Audit Office, there are 12 separate teams and organisations who are in some way responsible for infosec in British government departments and whom the Cabinet Office is utterly failing to co-ordinate.

DCMS said:

The tie-up is the first step in the development of two world-leading innovation centres as part of the Government’s £1.9bn National Cyber Security Programme.

The facility will also fast-track new firms into the booming cyber security sector which contributed £1.8bn in exports to the UK economy last year and grew from £17.6bn in 2014 to almost £22bn in 2015.

The accelerator itself will be operated by Wayra UK, part of Telefónica Open Future, and will offer start-ups the opportunity to access “GCHQ's world-class personnel and technological expertise to allow them to expand capability, improve ideas and devise cutting-edge products to outpace current and emerging threats.”

Applicants can contact Wayra here to be part of the programme which includes "insights to Government procurement processes, IP management, export controls and information assurance architecture." ®

Sponsored: Optimizing the hybrid cloud


The Register - Security

FBI said to investigate possible hack of another Democratic Party organizationDemocratic presidential candidate and former Secretary of State Hillary Clinton appears on Meet the Press in Washington, D.C., on Sept. 27, 2015. Credit: William B. Plowman/NBC

The FBI is said to be investigating yet another suspected hack of a Democratic Party organization, this time of the Democratic Congressional Campaign Committee that raises funds for Democrats running for the House of Representatives.

The previously unreported hack of the DCCC is likely to have been aimed at gathering information on donors rather than steal funds, four sources told Reuters.

[ Make threat intelligence meaningful: A 4-point plan. | Discover how to secure your systems with InfoWorld's Security newsletter. ]

The intrusion is likely to raise fresh concerns about Russia trying to meddle in the U.S. elections. Another hack of the Democratic National Committee, suspected by security investigators to have been perpetrated by Russians, led to an embarrassing dump on Friday of leaked emails that showed that the Democratic Party's national strategy and fund-raising committee had favored Hillary Clinton over Senator Bernie Sanders, her rival in the presidential nomination campaign.

The release of the emails by whistle-blowing website WikiLeaks, which did not disclose its source, led to the resignation of DNC Chairwoman Debbie Wasserman Schultz. The FBI said earlier this week it was investigating the attack on the DNC. “A compromise of this nature is something we take very seriously," it said.

The DCCC hack could have begun as recently as June and involved the setting up of a “spoof website” with a name similar to that of the main donation site of the organization. That tricked campaign donors for some time to visit the spurious site rather than the company that processes the donations, according to the
InfoWorld Security