Wednesday, June 21, 2017

RNC database leak exposes records for 198 million voters

Security Digest
Information security news and advice from TechTarget's network | June 21, 2017
TechTarget
FEATURED STORY
RNC leak of voter database exposes poor cloud security practices
by Michael Heller, Senior Reporter

A massive voter database RNC leak underscores the poor cloud security practices in place in the U.S. government and many enterprises. (SearchSecurity.com)

Advertisement
NEWS
 
Microsoft to disable SMBv1 by default in fall Windows updates

Microsoft claims recent WannaCry attacks did not influence the decision to disable SMBv1 by default in the next major Windows updates. (SearchSecurity.com)

 
Valerie Plame warns of increased nation-state cyberattacks

At the 2017 Cloud Identity Summit, former covert CIA officer Valerie Plame discussed the increasing risks of nation-state cyberattacks focused on geopolitical influence. (SearchSecurity.com)

 
Ping embeds multifactor authentication security in mobile apps
At the 2017 Cloud Identity Summit, Ping Identity launched a new software development kit that will embed multifactor authentication security features in mobile apps. (SearchSecurity.com)
 
 
 

Router security issues highlighted by CIA's CherryBlossom project

The latest WikiLeaks release on CIA hacking tools includes the CherryBlossom project, which highlights router security issues, including a lack of firmware signing validation. (SearchSecurity.com)

 
Hidden Cobra hackers target U.S. with DeltaCharlie malware
News roundup: DeltaCharlie malware is a threat to the U.S., according to a US-CERT warning about Hidden Cobra. Plus, a DVR flaw could create a bigger botnet than Mirai, and more. (SearchSecurity.com)
 
Risk & Repeat: Comey warns of more election hacking
In this week's Risk & Repeat podcast, SearchSecurity editors discuss former FBI Director James Comey's testimony on election hacking and election interference from Russia. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
Information privacy and security requires a balancing act

Maintaining information privacy and security seem to be separate challenges, but in reality, each is integral to the other. Expert Kevin Beaver explains how to work toward both. (SearchSecurity.com)

 
How to ensure a secure data transport of information in the cloud
A secure data transport of information stored in the cloud can be challenging. Expert Frank Siemons explains the options available to companies for securing physical data movement. (SearchCloudSecurity.com)
 
 
 
 

How intelligence data leaks caused collateral damage for infosec

Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers. (SearchSecurity.com)

 
How did thousands of MongoDB databases get hijacked?

Thousands of MongoDB configurations were hijacked due to poor authentication practices. Expert Nick Lewis explains how organizations can properly configure their implementations. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: