heitinck

676 Added | 1 Magazine | 36 Likes | 71 Following | 57 Followers | @heitinck | Independent Int. Security pro, infosec, SIEM, monitoring, hacking. Collect info during my Travels.

Global Cyber Security Risk Perception: Highest Management Priorities

Global Cyber Security Risk Perception: Highest Management …

Cybersecurity

81 Percent of Cybersecurity Pros Agree: Cyber Threat Intelligence Improves Prevention, Detection, and Response Capabilities

<i>SANS Report Sponsored by DomainTools Reveals Cyber Threat Intelligence (CTI) Gaining Momentum as Organizations Battle to Keep Up with Hackers]</i>As …

Cybersecurity

Security Awareness Training Top Priority for CISOs: Report [PDF]

SecurityWeek's Kevin Townsend wrote an excellent summary of the brand new FS-ISAC - "CISO Cybersecurity Trends Study":<b>"Thirty-five percent of CISOs</b> …

Security

Data breach fatigue requires better response planning

With the number of data breaches reaching record levels and expected to rise, companies and consumers alike are trying to navigate a new reality …

Iowa State University

Dutch Official Admits Lying About Meeting With Putin: Is Fake News Used by Russia or About Russia?

Every empire needs a scary external threat, led by a singular menacing villain, to justify its massive military expenditures, consolidation of …

Russia

Intel is making smart glasses that actually look good

Exclusive first look at Vaunt, which uses retinal projection to put a display in your eyeball<p>The most important parts of Intel’s new Vaunt smart glasses are the pieces that were left out.<p>There is no camera to creep people out, no button to push, no gesture area to swipe, no glowing LCD screen, no …

Wearable Tech

2017 OWASP Top 10: The Good, the Bad and the Ugly

Since its founding in 2001, the Open Web Application Security Project (OWASP) has become a leading resource for online security best practices. In …

Information Security

Exercise-tracking app mapped military bases, revealed where spooks go jogging

Last November, exercise-tracking app Strava published a “Heatmap” of user activity which it cheerily boasted comprised a billion activities, three …

GDPR

Top 5 Concerns To Focus On For Data Privacy Day

Happy Data Privacy Day! I’m sorry I didn’t get you anything.<p>Data Privacy Day is actually tomorrow. It is held annually on January 28 in an effort to promote awareness of the importance of protecting your data and privacy. A recent survey from McAfee, however, illustrates just how far we have to go …

Information Systems

Dutch agencies provide crucial intel about Russia's interference in US-elections

Hackers from the Dutch intelligence service AIVD have provided the FBI with crucial information about Russian interference with the American …

Mind the GDPR gap: Board members at odds with management on level of GDPR compliance

New research by data security company Clearswift has shown that board members are more confident than management about their organisation’s ability …

Brazil

Hackers lure victims with fake cryptocurrency SpriteCoin

For folks in a mad rush to finally start cashing in on cryptocurrencies, <i>beware</i> SpriteCoin! The only people making money from SpriteCoin are the …

Encryption

A comprehensive guide to corporate online surveillance in everyday life

Cracked Labs' massive report on online surveillance by corporations dissects all the different ways in which our digital lives are tracked, from the …

Dutch ministers to use ‘safe phones’ on trips to ‘difficult countries’

The Dutch secret service “Algemene Inlichtingen en Veiligheidsdienst” (AVID) has kicked off a program to equip ministers with ‘safe phones’ on …

Mark Rutte

CTIX | STIX TAXII Server | Cyber Threat Intelligence eXchange

Cyware Threat Intelligence eXchange (CTIX)<br>– with STIX, TAXII Standards<p>Accelerating secure bidirectional cyber threat information sharing through …

Cybersecurity

Japan firm says it will pay part of salaries in Bitcoin , Business News - Top Trendings News in Singapore

<b>Tokyo – A Japanese company will start paying part of its employees’ salaries in Bitcoin, as it aims to get a better understanding of the virtual</b> …

Hawaii’s missile alert agency keeps its password on a Post-it note

Last Saturday the people of Hawaii received a terrifying alert about a ballistic missile heading its way.<p>Fortunately the alert was a false alarm, …

Linux and Windows Servers Targeted with RubyMiner Malware

Security researchers have spotted a new strain of malware being deployed online. Named RubyMiner, this malware is a cryptocurrency miner spotted …

Meltdown-Spectre firmware glitch: Intel warns of risk of sudden reboots

Older Broadwell and Haswell chips have been taking a hit from Intel's CPU patch.<p>Intel has revealed that a glitch in its patch for the Meltdown and …

Welcome to WPA3, the next step in Wi-Fi security

Nearly 14 years after it ratified WPA2 (Wi-Fi Protected Access 2), the Wi-Fi Alliance has given the world a peek at what might be coming next for …

WPA3 WiFi Standard Announced After Researchers KRACKed WPA2 Three Months Ago

People say "every kick in the ass is a step forward." Well, Belgian security researcher Mathy Vanhoef gave the Wi-Fi Protected Access (WPA) standard …

Diabetes drug 'significantly reverses memory loss' in mice with Alzheimer's

A drug developed for diabetes could be used to treat Alzheimer's after scientists found it "significantly reversed memory loss" in mice through a …

AI is now so complex its creators can’t trust why it makes decisions

Artificial intelligence is seeping into every nook and cranny of modern life. AI might tag your friends in photos on Facebook or choose what you see on Instagram, but materials scientists and NASA researchers are also beginning to use the technology for scientific discovery and space …

Machine Learning

New Algorithms Can Repair Corrupted Images, Enhance Low-Res Photos

Deep convolutional neural networks (CNN) have become a popular tool for image generation and restoration, with a few algorithms released in the last …

Machine Learning

Use Fake Answers to Online Security Questions

The sign up processes for online banking accounts, new email addresses, or health insurance apps all involve a few extra security measures to protect …

Snowden's New App Turns Your Phone Into a Home Security System

Your digital security, any sufficiently paranoid person will remind you, is only as good as your physical security. The world's most sensitive users …

Surveillance

Life Inside China’s Total Surveillance State

China

Bitcoin Exchange Shuts Down After Getting Hacked a Second Time This Year

YouBit, a South Korea-based cryptocurrency exchange, has filed for bankruptcy and will shut down later today after getting hacked for the second time …

Bitcoin offers the cannabis industry an alternative to banks

The cannabis industry may offer clues to the future of bitcoin.<p>Although medical use marijuana is now legal in more than half the states and …

Cannabis

Lazarus Group Targets Bitcoin Company

12/15/2017<br>12:56 PM<p>50%<p>50%<p>The cybercrime group blamed for attacks on the SWIFT financial network launches a spearphishing campaign to steal employee …