Information Security
3.0K views | +0 today
 
Rescooped by Paul Misner from Radio Show Content Ideas
onto Information Security
Scoop.it!

18 Things You Might Actually Find By Dumpster Diving

18 Things You Might Actually Find By Dumpster Diving | Information Security | Scoop.it
Turns out sifting through trash can be quite lucrative.



Real, live, fluffy, adorable, dumpster kittens.


Reddit user Ninjahoevinotour found a kitten in an Arby's dumpster. You paid $200 for yours.

Via Stephanie Winans
Paul Misner's insight:

Watch your dumpsters.

more...
Stephanie Winans's curator insight, October 2, 2013 6:10 PM

The makings of a great stunt.

Information Security
Information Security Focusing on Malware, Browser Based Threats, and solutions.
Curated by Paul Misner
Your new post is loading...
Scooped by Paul Misner
Scoop.it!

Office 365 Vulnerability Exposed Any Federated Account

Office 365 Vulnerability Exposed Any Federated Account | Information Security | Scoop.it
Microsoft in January patched a severe Office 365 vulnerability that exposed accounts whose domains were configured as federated.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

This one chart explains why cybersecurity is so important

This one chart explains why cybersecurity is so important | Information Security | Scoop.it
New hacking threats have emerged in th
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

2016 Threat Report By Forcepoint 4/27/2016 at 2PM Eastern

Forcepoint Security Labs® presents their annual Threat Report – the essential analysis of what’s really happening in the cyber landscape.
Paul Misner's insight:

Today 4/27/2016 2 PM Forcepoint Reviews 2016 Threat Predictions.

more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

For privacy and security, change these Android settings right now | ZDNet

For privacy and security, change these Android settings right now | ZDNet | Information Security | Scoop.it
All Android devices are different, but they all come with some basic security and privacy features. Here are the important tweaks to get started.
Paul Misner's insight:

Your phone contains pretty much all the info it takes to steal your identity. Consider raising security on it.

more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

A million-plus accessed Facebook via Tor last month

A million-plus accessed Facebook via Tor last month | Information Security | Scoop.it
Just-released figure doubles the number of Facebook users accessing the site via Tor from June 2015.
Paul Misner's insight:

Your employees may be using TOR to violate security policy, ultimately compromising your network

more...
No comment yet.
Rescooped by Paul Misner from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

The Anatomy of a Data Breach

The Anatomy of a Data Breach | Information Security | Scoop.it
In a standard data breach, the type that occurs between 80 to 90 million times per year, there are roughly 6 essential steps.

Via Constantin Ionel Milos / Milos Constantin
more...
Ken Feltman's curator insight, April 22, 3:35 PM
80 to 90 million data breaches a year?
Scooped by Paul Misner
Scoop.it!

US advises deleting QuickTime from Windows computers

US advises deleting QuickTime from Windows computers | Information Security | Scoop.it
A cyber security team at the US Department of Homeland Security is advising people to remove QuickTime media software from Windows computers to avoid being hacked.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

The ransomware that knows where you live - BBC News

The ransomware that knows where you live - BBC News | Information Security | Scoop.it
A widely distributed scam email that quotes people's postal addresses links to a dangerous form of ransomware, according to a security researcher.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Cryptography, information assurance, cloud and others: 5 key skills for cyber security professionals

Cryptography, information assurance, cloud and others: 5 key skills for cyber security professionals | Information Security | Scoop.it
List: Protecting data and systems in the modern business requires a range of disciplines.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Ransomeware!

Ransomeware! | Information Security | Scoop.it
Don't we all feel vulnerable to the internet actions we have taken in the past, or from what our children and friends are bringing into our homes and work places? I was a recent victim of a personal
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Cybercrime: A Black Market Price List From The Dark Web

Cybercrime: A Black Market Price List From The Dark Web | Information Security | Scoop.it
What does it cost for malware, stolen identities and other tools of the cybercriminal trade? Probably less than you think.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Mattel nearly loses $3M to a classic phishing scam

Mattel nearly loses $3M to a classic phishing scam | Information Security | Scoop.it

A finance executive fell victim to a phishing scam that saw the Los Angeles-based maker of children's toys wire a cool $3 million to Chinese hackers

more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Qatar National Bank Probes Alleged Leak of Clients’ Data

Qatar National Bank Probes Alleged Leak of Clients’ Data | Information Security | Scoop.it
Qatar National Bank said it is investigating an alleged data leak of personal and financial details of clients including members of the country’s ruling family, underlining the growing threat of cybercrime in the Middle East.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Top 5 social media phishing scams to avoid

Top 5 social media phishing scams to avoid | Information Security | Scoop.it
Online criminals are using big social media platforms like Facebook and Twitter to blend in and target more victims at one time.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Petya ransomware decryption tool sets your files free

Petya ransomware decryption tool sets your files free | Information Security | Scoop.it
The Petya ransomware crooks weren't very careful and it's possible to crack the encryption with a few steps and a free online tool.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Ransomware in your inbox: the rise of malicious JavaScript attachments

Ransomware in your inbox: the rise of malicious JavaScript attachments | Information Security | Scoop.it
As well as avoiding booby-trapped Word attachments, you need to keep your eye out for suspicious JavaScript in emails, too.
Paul Misner's insight:

Now Javascript is emerging as a hacking alternative to word macros

more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

No firewall and $10 routers blamed in Bangladesh Bank heist

No firewall and $10 routers blamed in Bangladesh Bank heist | Information Security | Scoop.it
Rudimentary security procedures at Bangladesh Bank are being blamed for the massive online banking heist that saw the country's central bank lose $8
Paul Misner's insight:

This is about as bad as it gets. 

more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

How a federal spy case turned into a child pornography prosecution

How a federal spy case turned into a child pornography prosecution | Information Security | Scoop.it
An investigation in California illustrated the use of national security powers in a criminal matter.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

How hackers eavesdropped on a US Congressman using only his phone number

How hackers eavesdropped on a US Congressman using only his phone number | Information Security | Scoop.it
SS7 routing protocol also exposes locations, contacts, and other sensitive data.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Apple: We never gave our source code to China

Apple: We never gave our source code to China | Information Security | Scoop.it
In reply to a hint that the company had cooperated with the Chinese government by handing over source code to the software that runs iPhones and iPads, Apple's general counsel says the firm hadn't done so.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

MIT’s Teaching AI How to Help Stop Cyberattacks

MIT’s Teaching AI How to Help Stop Cyberattacks | Information Security | Scoop.it
AI2 uses humans and machines to identify---and prevent---cyber threats.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Five signs a cash machine has been tampered with by criminals

Five signs a cash machine has been tampered with by criminals | Information Security | Scoop.it
Up to 2,500 Britons fall victim to card fraud at ATMs every week - and those going to the US on business or holiday have been told to take extra care, with machine hacks on the rise in America.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

Hackers targeting, breaching law firms for insider trading info

Hackers targeting, breaching law firms for insider trading info | Information Security | Scoop.it
Two of the most prestigious law firms in the US have had their computer networks compromised by hackers looking for sensitive information.
more...
No comment yet.
Scooped by Paul Misner
Scoop.it!

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet | Information Security | Scoop.it
Badly configured software used on thousands of machines can let hackers into X-ray scanners, industrial control systems, doctors' servers storing medical records, and more.
more...
No comment yet.