Wednesday, September 6, 2017

NSA-linked kill switch discovered within Intel Management Engine

Security Digest
Information security news and advice from TechTarget's network | September 6, 2017
TechTarget
FEATURED STORY
Intel kill switch code indicates connection to NSA
by Michael Helller, Senior Reporter

Researchers discovered an Intel kill switch hiding in one of the chip maker's software products along with references to an NSA program focused on secure computing. (SearchSecurity.com)

Advertisement
NEWS
 
Spambot email leak compromises 711M records

An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts. (SearchSecurity.com)

 
Meet the new government CISO for the nation's capital

With years of cybersecurity and military IT experience, the District of Columbia's first information security officer brings a well-developed toolkit to the job. (SearchSecurity.com)

 
 
 

Enterprise compliance with PCI DSS is up, says Verizon

News roundup: More than half of enterprises are in compliance with PCI DSS, according to a Verizon report. Plus, Turla is on the attack again with a new campaign, and more. (SearchSecurity.com)

 
Risk & Repeat: Alternative infosec conferences on the rise
In this week's Risk & Repeat podcast, SearchSecurity editors discuss how smaller, more targeted infosec conferences are making a name for themselves in the shadow of much larger events. (SearchSecurity.com)
 
 
 
EXPERT ADVICE
 
How NotPetya ransomware used legitimate tools to move laterally

WannaCry and NotPetya ransomware woke enterprises up to an expanded threat landscape. Expert Michael Cobb explains these threats and what enterprises can do to stop them. (SearchSecurity.com)

 
A look at serverless applications and how to secure them
Serverless applications can be powerful tools, but they also require specific security tactics. Expert Ed Moyle explains how these applications work and how they can be secured. (SearchCloudSecurity.com)
 
 
 
 

Why WannaCry and other computer worms may inherit the earth

A vast majority of APT attacks and malware delivery happens via spear phishing. But worms have always had a place in the toolkit when the delivery method fit the mission. (SearchSecurity.com)

 
Should an enterprise BYOD strategy allow the use of Gmail?

Using personal Gmail accounts for business purposes is not a secure enterprise BYOD strategy. Expert Matthew Pascucci discusses why companies should avoid implementing this tactic. (SearchSecurity.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

No comments: