Newsletter Events News Contact Us Buy

Cyber Security News

Integris Security News References













The following is a list of news articles relating to information security.


DateTitle/Description
September 06, 2016Danger Drone is the new laptop that is designed specifically to take
flight and help conduct cyberattacks by allowing a hacker to physically get close to a target. The device was developed by security experts to aid penetration testers or pentesters bypass challenging aspects and ensuring organisations have effective defences against cyberattacks.The $500 custom-developed Danger Drone is the brain-child of consulting firm Bishop Fox. "Think of it as a flying hacker...
August 11, 2016Fallout over drone crash at Koeberg
11 Aug '16, 07:14amSiyavuya Mzantsi and Carlo PetersenCape Town - While the Hawks have confirmed taking over the investigation into a drone that crashed at the Koeberg Nuclear Power Station, nuclear experts have reacted with outrage towhat they say is Eskom’s “lax security”.The SA Civil Aviation Authority (Sacaa) said the crash was being handled by its legal and aviation...
July 29, 2016Drones Deliver Illegal Goods To Prison Inmates ‘Like Amazon’
n’Prisons are beginning to install drone-fighting tech to fight the growing problem SHARE SHAREPhoto Illustration: Diana QuachBy Jennings BrownJun 30, 2016 at 5:00 AM ETYou might still be years away from receiving drone deliveries. But for people in prison, it’s already a reality. As commercially available drones are getting cheaper and carrying heavier payloads, many corrections officers are...
January 16, 2015Steve Israel: Long Island can beat back cyber-attacks
Updated January 16, 2015 9:25 AM By STEVE ISRAEL Seventy-five years ago, facing World War II, Long Island made a transformation from potato fields and pumpkin farms to become the defense capital of America. We organized and mobilized, researched and developed, engineered and assembled. We built technologies that won World War II, the Cold War and went on to win the space race. America's global strength...
January 14, 2015Rally to Show Support for NYPD Held in Queens
A rally was held in Queens Tuesday to show support for the New York City Police Department. NY1's Ruschell Boone filed the following report.Calling themselves the silent majority, a small group led by retired NYPD Captain Joe Concannon took to the steps of Queens Borough Hall Tuesday to voice their support for the New York City Police Department."We support our local police, we trust out local police...
January 13, 2015Retired NYPD captain is organizing a series of six “Support Your Local...
, starting with one at noon Tuesday at Queens Borough Hall and continuing in all five boroughs.“These cops live in a bubble,” Joseph Concannon told The Post. “Right now they think everybody in the city hates them. I think it’s important to help the officers build their morale so they understand it’s a very narrow minority of people in the city who do not agree with what they’re...
January 09, 20152015 NYC "Support Your Local Police"
l Police" interviewIntegris Security president Joe Concannon was recently on The Steve Malzberg Show on NewsmaxTV.  Steve and Joe discussed the series of "Support Your Local Police" rallies that promote unity with the men and women in blue who serve the communities of New York City.  Watch it on NewsmaxTV  (http://nws.mx/1IwF1bA).Posted by Phil Froehlich at 9:49 PM
January 07, 2015Security ranked top spending priority for CIOs
ty was ranked as the top spending priority for CIOs this year, with a whopping 75% of the respondents saying they would increase spending in 2015. Security was the top concern last year, too, but only 59% had indicated they would increase spending in it. That's a huge jump."CIOs clearly have heightened concerns from the many security breaches that occurred in 2014, resulting in an inflection in overall...
December 03, 2014Typical in the information technology sector everyone is always focused on...
ion security, physical security, intelligence and related industry fields. Wednesday, December 3, 2014 The Rear View MirrorTypical in the information technology sector everyone isalways focused on what’s next, the latest, hottest new application, the coolestmobile telephone and of course the work around that just makes life a littleeasier.  Not to be ignored are all thosenewly fashioned...
November 13, 2014Integris Security Automated Hours of Work With a Single Mouse Click
e ClickThe recent presentation by Integris Security CTO, Blake Cornell, titled "Hacking With Glue" ? has been published. It outlines some software we have been developing for internal use which saves time and increases the ROI for our clients."Penetration Testing involves a lot of repetitive manual processes. This includes the execution of a multitude of security tools. These are traditionally executed...
October 20, 2014Cyber Security Awareness Month
and the industries leading computer organizations in NYC have hit the ground running with their first joint conference, a success,  ushered in without nearly breaking a sweat.NY Metro InfraGard, ISSA, ISACA, OWASP, Cloud Security and others joined together with over 300 security professionals in Brooklyn, NY at St Francis College.  The lectures showcased outstanding sessions on Active Directory and a...
October 08, 2014Human Nature Is the Weakest Link in Cyber
ecurity | The Fiscal Times Skip to main content The Fiscal Times Free Newsletter Policy Politics Search form Search HomeOpinionPolicy PoliticsBig DecisionsAmerica at WarGovernment ShutdownGovernment WasteDebt CeilingDefenseObamacareElections2016 Elections2014 ElectionsPeopleBusiness EconomySectors CompaniesUS EconomyGlobal EconomyLife MoneyLearning EconomicsCareer EconomicsPersonal...
August 19, 2014Community Health Systems, which operates 206 hospitals across the United...
mputers and stole data on 4.5 million patients. Hackers have gained access to their names, Social Security numbers, physical addresses, birthdays and telephone numbers. Anyone who received treatment from a physician's office tied to a network-owned hospital in the last five years -- or was merely referred there by an outside doctor -- is affected. The large data breach puts these people at heightened...
August 07, 2014A Russian group has hacked 1.2 billion usernames and passwords belonging to...
y - a US firm specialising in discovering breaches.Hold Security described the hack as the "largest data breach known to date".It claimed the stolen information came from more than 420,000 websites, including "many leaders in virtually all industries across the world".Hold Security did not give details of the companies affected by the hack."They didn't just target large companies; instead, they targeted...
August 07, 2014CNET attacked by Russian hacker group
he news site CNET. It later said it stole usernames, encrypted passwords and emails for more than one million users.CNET said a representative from the group - which calls itself 'w0rm' - informed it about the hack via a Twitter conversation.A spokeswoman for CBS Interactive - the owner of CNET - said the firm had "identified the issue and resolved it".According to CNET, w0rm offered to sell the database...
June 24, 2014We are not winning the cyber war.
There, I said it.It isn’t that we are necessarily “losing” the cyber war, but we definitely are not gaining ground on our adversaries. No material impact is being made on the volume of cyberattacks. In fact, recent estimates indicate that 97% plus of companies have suffered some form of serious cyber intrusion, and that it takes on average anywhere between 7 and 8 months to discover that an attack...
June 09, 2014At Integris Security we're asking the question
olerance? Integris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Monday, June 9, 2014 What's Your Risk Tolerance?                  Where's your army?At  Integris Security we're asking the question who do you have protecting  your data and...
June 06, 2014Blackshades an international hazard
ades - an international hazard Integris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Friday, June 6, 2014 Blackshades - an international hazard It is important to note that as I start this discussion readers are reminded that while malware today is portrayed as dangerous, destructive and...
June 04, 2014What's surprising is City Council
erant NYC Council Successfully Handcuffs NYPD - resulting in the return of Crime, Disorder and Fear to the streets of NYCIntegris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Wednesday, June 4, 2014 Intolerant NYC Council Successfully Handcuffs NYPD - resulting in the return of Crime,...
June 03, 2014
Integris Security Insights: Uncertainty, risky first half of 2014...the year of the hack?Integris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Tuesday, June 3, 2014 Uncertainty, risky first half of 2014...the year of the hack?Pushing the buttons of millions...
May 31, 2014Exclusive: US Companies seek cyber experts
experts for top jobs, board seats| Reuters   Edition: U.S. Africa Arabic Argentina Brazil Canada China France GermanyIndiaItaly Japan Latin America Mexico Russia SpainUnited Kingdom Home Business Business Home Economy Legal Deals Business Video Aerospace & Defense Banks Autos Reuters Summits Small Business Markets Markets Home U.S. Markets European Markets Asian Markets Global Market Data Indices...
May 31, 2014Lessons from the US Veterans Administration
e U.S. Veterans AdministrationIntegris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Saturday, May 31, 2014 Lessons from the U.S. Veterans AdministrationGovernment run healthcare is suffering from the stiff stench of reality this week as the Veterans Administration emplodes in a wide scale...
May 30, 2014Accountability: Have you heard the call
ty: Have you heard the call from Target yet?Integris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Friday, May 30, 2014 Accountablity: Have you heard the call from Target yet?At some point Industry across America will face a tipping point.  A point at which lying to the U.S. Congress,...
May 29, 2014eBay: How Could You?
sights: eBay: How could you?Integris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Thursday, May 29, 2014 eBay: How could you?Step up eBay, the world's largest online marketplace and the next in a line of the Corporations who may have flaunted the very fact they too are capable of security...
May 28, 2014Needed: Breach detection
correction Breaches of organizations' security perimeters is a fact of life, experts say. But there are ways to CISOs taking a leap of faith More CISOs are embracing new career paths within the industry The sorry state of cybercrime Attempts to defeat cybercrime are failing…miserably. Understanding where we are failing is an important Apple users hit by $100 ransom demand after mystery iCloud account...
May 27, 2014DBIR 2014 Significance
ghtsIntegris Security InsightsPerspectives on: Security ranging from business continuity, information security, physical security, intelligence and related industry fields. Tuesday, May 27, 2014 DBIR 2014 significance?Hello everyone,Just a short post on the Verizon Data Breach Investigation Report 2014.  Verizon has done an exceptional job at improving the overall content of their report from the...
April 28, 2014Phishing Attacks On Telecommunication Customers Resulting In Account...
Phishing attacks targeting various telecommunication companies’ customers continue. Individuals receive automated telephone calls that claim to be from the victim’s telecommunication carrier. The IC3 released an advisory about this scam in May 2013. Since then, the attacks have increased and recently, victims have reported receiving SMS texts with a similar phishing message encouraging them...
April 02, 2014Digital money tools can save time and trouble. Here’s the lowdown on...
Simplify Your Finances | Digital Money Tools Apps - Consumer Reports News   Sign In | Subscribe   Username Password Remember Me Forgot username? Forgot password?   Sign In | Subscribe   My Account  |  Customer Service  |  Site Features Donate | A-Z Index Car Types Convertibles Hybrids/EVs Luxury cars Minivans Pickup trucks Sedans Small cars Sports cars SUVs Wagons...
March 10, 2014Cybersecurity experts stressed adoption of chip cards
curity experts stressed that adoption of chip cards is just one of many steps that need to be taken to secure the U.S. payments infrastructure. They also called for more education of retailers about card data security and stronger enforcement of Payment Card Industry data security standards.The two hearings were called in the wake of the Target Corp. and Neiman Marcus breach investigations. The House...
March 06, 2014Estonia, Georgia and now Ukraine...
The Russian are coming, the Russians are coming!  As a modern day Paul Revere we're shouting at the tops of our lungs the Russians are coming!  But what does all this portend for those in the security and cyber security space?In the sixties, seventies and so forth we were warned and taught in schools that the Communist were going to take over the world.  We were told they would do it...
February 27, 2014Hackers target Brazil's World Cup for cyber attacks
Wed Feb 26, 2014 11:49am EST 0 Comments Tweet Share this Email Print Related Topics Stocks » Markets » Olympics 2012 » Financials » Technology » Telecommuncations Services » (Corrects date of World Cup kickoff to June 12, 9th paragraph, and year of London Olympics to 2012, 31st paragraph)By Esteban IsraelSAO PAULO Feb 26 (Reuters) - Brazilian hackers are threatening to...
February 25, 2014Cybercrime Hits U.S. Companies Harder Than Most
BY Cadie Thompson | FROM CNBC| February 25, 2014| 0 Comments | Image credit: Shutterstock Companies everywhere are increasingly vulnerable to cybercrime, but U.S. companies appear to be even more threatened than most, says a new report.According to PricewaterhouseCooper's 2014 Global Economic Crime Survey, U.S. businesses were hit harder financially by cybercrime relative to other countries in recent...
February 19, 2014Financial institutions have reportedly spent over $200m to replace credit and...
S retailing company Target.According to data collected by the Consumer Bankers Association (CBA) and the retail-banking trade group Credit Union National Association (CUNA), the spending still continues to go up and excludes losses incurred due to fraud, which, if added would drive the totals 'much higher'.CBA president and CEO Richard Hunt said financial institutions of all sizes have been aggressive in...
February 18, 2014Healthcare organizations of all kinds are being routinely attacked and...
A new study set to be officially released Wednesday found that networks and Internet-connected devices in places such as hospitals, insurance companies and pharmaceutical companies are under siege and in many cases have been infiltrated without their knowledge. The study was conducted by Norse, a Silicon Valley cybersecurity firm, and SANS, a security research institute. In the report, the groups...
February 13, 2014Executive Order -- Improving Critical Infrastructure Cybersecurity
EXECUTIVE ORDER- - - - - - -IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow...
February 12, 2014Inside Endgame: A Second Act For The Blackwater Of Hacking
This story appears in the March 3, 2014 issue of Forbes. 1 comments, 0 called-out Comment Now Follow Comments Following Comments Unfollow Comments Comment Now Follow Comments Following Comments Unfollow Comments Endgame CEO Nate Fick is exposing (a part of) his shadowy company to the sunlight. In the classic hacker career narrative, a juvenile genius breaks into the Internet’s most sensitive networks,...
February 07, 2014NBC News-got-hacked story ignores FSB surveillance that makes NSA look...
NBC News’ Engel warned of rampant hackery in Sochi after experiencing no such thing.In a Feb. 6 blog, Gartner analyst Paul Proctor applauded NBC News for pointing out the “critical condition of cybersecurity” by showing how easy it is for a foreigner to get hacked in Russia.He also excoriated NBC News and the non-technical press in general for demonizing hackers, overstating the danger...
February 04, 2014U.S. officials have warned for years that the prospect of a cyberattack is...
for computer security. Yet the report by the Republican staff of the Senate Homeland Security and Governmental Affairs Committee says that federal agencies are ill-prepared to defend networks against even modestly skilled hackers.“As a taxpayer, I’m outraged,” said Alan Paller, who is research director at the SANS Institute, a cybersecurity education group, and reviewed a draft version...
February 02, 2014On Wednesday, Neiman Marcus CEO Karen Katz announced via the company's...
million customer card accounts. “While the forensic and criminal investigations are ongoing, we know that malicious software (malware) was clandestinely installed on our system,” Katz wrote. “It appears that the malware actively attempted to collect or ‘scrape' payment card data from July 16, 2013 to October 30, 2013. During those months, approximately 1,100,000 customer payment cards could have...
February 02, 2014Cybercrime’s perfect storm
Government Security News About GSNAdvertiseSubscribeRSSContact Us Register | Login HomeTechnology SectorsAccess Control | IdentificationCBRNE | DetectionCommunicationsCyber SecurityDisaster Preparedness | Emergency ResponseEducation | TrainingIT SecurityPerimeter ProtectionVideo Surveillance | CCTVMarket SectorsAirport | Aviation SecurityBorder SecurityFederal | Agencies | LegislativeInfrastructure...
February 02, 2014Usernames and passwords of its email customers have been stolen and used to...
Users affected have been emailed or sent an SMSYahoo is the second-largest email service worldwide, after Google's GmailCompany 'working with federal law enforcement' on the issueByMark Prigg PUBLISHED: 19:02 EST, 30 January 2014 | UPDATED: 21:47 EST, 30 January 2014 430 shares 59 View comments Yahoo has admitted that usernames and passwords of its email customers have been stolen and used to access...
February 01, 2014If you’re a US shopper, there’s almost a 50% chance that your...
Search Security Intelligence Recommended Tagsadvanced persistent threatsAndroidapplication-securityApplication Security Testingappscanbig-data-securitybig databreachesbyodcisocloudcloud securitycomplianceCyber Securitycybersecuritydatadata-securitydata breachFederalgovernmentiamibmibm-securityibm-x-forceLog ManagementmalwareMicrosoftMicrosoft Patch Tuesdaymobilemobile...
January 31, 2014The "touchlogging" attack method
will be presented in detail at RSA Conference next month. At next month's RSA Conference, a security researcher will demo a hack that could allow an attacker to capture all the touchscreen movements a user makes on their Android or iOS device. According to Neal Hindocha, a senior security consultant at Trustwave, the “touchlogging” attack method “seems like the logical continuation of...
January 30, 2014Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores
Issue has been identified and resolved MINNEAPOLIS — December 19, 2013 Target today confirmed it is aware of unauthorized access to payment card data that may have impacted certain guests making credit and debit card purchases in its U.S. stores. Target is working closely with law enforcement and financial institutions, and has identified and resolved the issue.“Target’s first priority...
January 30, 2014Navy cryptology specialist tapped to helm NSA
Vice Admiral Michael S. Rogers is set to become the new director of the National Security Agency, pending Senate confirmation. Would his leadership change the agency's outlook? by Edward Moyer January 30, 2014 2:33 PM PST Follow @edatnews Vice Admiral Michael S. Rogers(Credit:US Navy)It looks like the NSA may soon be in the hands of a Navy officer who specialized in code-making and breaking.The White...
January 30, 2014IBM’s piecemeal withdrawal from the hardware market – a retreat...
papers | The Channel Data - NetworkingVirtualisationBOFH Data Center > Servers IBM's bailed out of the server market - will they dump Storwize next? Whither IBM storage now, post X86 server divestment? By StorageBod, 29th January 2014 22 Related stories Analysis Lenovo and IBM's System x biz: It'll be just like 2005's PC buyout It was inevitable: Lenovo stumps up $2.3bn for IBM System x server biz...
January 29, 2014White House cyber security chief warns U.S. must better protect itself
Enlarge Ryan McDonald White House cyber security coordinator Michael Daniel address a crowd in Baltimore on Wednesday. Ryan McDonald Digital Producer- Baltimore Business Journal Email  | Twitter  | Google The White House’s cyber security coordinator on Wednesday warned of an apocalypse if the U.S. doesn’t address the nation’s growing cyber threat.Michael Daniel said the country...
January 21, 2014Java the preferred point of entry for online criminals
Summary: It used to be Adobe and maliciously crafted Word, Excel, and PowerPoint documents, but Java now takes the cake compared to those methods, according to Cisco. By Michael Lee | January 20, 2014 -- 02:37 GMT (18:37 PST) Follow @mukimu Online criminals and scammers are having much more luck breaking into others' computers with Java rather than the usual desktop application exploits, according to...
January 04, 2014NSA seeks to build quantum computer that could crack most types of encryption
By Steven Rich and Barton Gellman, E-mail the writers In room-size metal boxes ­secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world. According to documents provided by former NSA contractor Edward Snowden, the effort to...
October 02, 2013Silk Road: How FBI closed in on suspect Ross Ulbricht
By Dave Lee Technology reporter, BBC News A lengthy investigation into internet communications lead the FBI to their suspect Continue reading the main story Related Stories FBI arrests Silk Road site suspect Dark web drug site hit by hacker US authorities believe that 29-year-old Ross William Ulbricht, arrested on Wednesday, is Dread Pirate Roberts (DPR) - the administrator of the notorious Silk Road...
October 01, 2013Integris Security Tools - Test Yourself Before Your Attackers Do
Integris Security has recently launched their FREE online enabled security tools in conjunction with National Cyber Security Awareness Month.  These tools were typically only available from within a command line interface (CLI) and require low level knowledge of the tools themselves. The Integris Security Tools removes this requirement and extends these tools to within a web browser and even your...
October 01, 2013Chief Minister Oommen Chandy delivered the valedictory address at the...
in ThiruvananthapuramChief Minister Oommen Chandy on Saturday said that the State Police Department’s cyber security hub, Cyberdome, scheduled to come up at Technopark would be a model in public private partnership.Delivering the valedictory address at the International Cyber Security and Policing Conference-2013, he said the public and the government were becoming increasingly dependent on the...
September 27, 2013An IT Flaw Has Let Unauthorized Users Exploit Army PCs for Years
Earlier this week, Buzzfeed reported that a computer security flaw in has left Army computers vulnerable for at least two years; today, the Army confirmed to Buzzfeed that this was, in fact the case. And that they have no plans to do anything to fix it.While the specifics of the flaw haven't yet been disclosed—for obvious reasons—what it does is alarming. Anyone with access to a shared Army computer...
  Copyright © 2013-2017   Site Map  Terms of Use Privacy Policy