article thumbnail

Disable WPAD now or have your accounts and private data compromised

Network World

The Web Proxy Auto-Discovery Protocol (WPAD), enabled by default on Windows and supported by other operating systems, can expose computer users' online accounts, web searches, and other private data, security researchers warn. based Context Information Security, during the DEF CON security conference this week.

Data 60
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

At the RSA Conference in February 2014, the company announced threat intelligence partnerships with ThreatGRID and Reversing Labs. “A A security strategy that only reacts to attacks isn’t acceptable,” said Paul Calatayud, Chief Information Security Officer of Surescripts. “To

CTO Hire 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Timeline: How a Hacker Tried to Poison a City

SecureWorld News

But here's the disturbing part for those in information security: the plant had not utilized TeamViewer in months, and apparently employees did not realize it was still on the computer involved. For the initial details on this attack, you can watch the press conference with Pinellas County Sheriff Bob Gualtieri, below.

article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

These are people who could also be attending a Salesforce conference. Okay, maybe not a Salesforce conference, but you get the idea. Simultaneously, self taught, it's a bunch, but also sharing information of his own history of, you know, BBs is forward to conferences and forums and to a certain extent Twitter is still.

Travel 52
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52
article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

ObserveIT enables security teams to detect a risky user activity, investigate incidents in minutes and effectively respond. He's from the Johns Hopkins University Information Security Institute and also my co-host on the "Hacking Humans" podcast. Get your free trial at observeit.com/cyberwire. Joe, great to have you back.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

ObserveIT enables security teams to detect a risky user activity, investigate incidents in minutes and effectively respond. He's from the Johns Hopkins University Information Security Institute and also my co-host on the "Hacking Humans" podcast. Get your free trial at observeit.com/cyberwire. Joe, great to have you back.