The Daily Information Security Dose
942 views | +0 today
The Daily Information Security Dose
The Daily Security Dose" is my way to maintain a list of links to website I consider to relevant and I use for my day to day advisory work
Curated by Joerg Asma
Your new post is loading...
Your new post is loading...
Scooped by Joerg Asma
Scoop.it!

Europäischer Gerichtshof: Google muss Suchergebnisse löschen - SPIEGEL ONLINE

Europäischer Gerichtshof: Google muss Suchergebnisse löschen - SPIEGEL ONLINE | The Daily Information Security Dose | Scoop.it
Dieses Urteil könnte gravierende Folgen haben: Der Europäische Gerichtshof hat eine Entscheidung zum "Recht, vergessen zu werden" im Internet gefällt. Suchmaschinen können in bestimmten Fällen verpflichtet werden, Links zu persönlichen Daten zu löschen.
more...
No comment yet.
Rescooped by Joerg Asma from Higher Education & Information Security
Scoop.it!

10 talking points about cybersecurity and your business

10 talking points about cybersecurity and your business | The Daily Information Security Dose | Scoop.it

PwC, Interbrand, Symantec and the Institute of Risk Management talk security, crisis control and planning for the ‘absolute worst’.

 

"It’s the large-scale cybersecurity breaches that make the headlines:Target, Adobe, Sony and the recent concerns about the Heartbleed bug being obvious examples.

 

Yet businesses of every size are grappling with how to secure their networks, devices and data. A roundtable this week in London organised by Symantec – disclosure: the company sponsors The Guardian's Secure + Protect blog – explored the issues.

 

Participants included Graham Hales, global CMO at Interbrand; Richard Horne, partner at PricewaterhouseCoopers; Richard Anderson, chairman of the Institute of Risk Management; and Sian John, senior cyber security strategist at Symantec. It was moderated by Tim Weber, director at Edelman.

 

Here are 10 of the main talking points from the event"


Via Higher Ed InfoSec Council
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Cyberwarfare Under Investigation: Stuxnet and Strategic Alliances – Jewlicious THE Jewish Blog

Cyberwarfare Under Investigation: Stuxnet and Strategic Alliances – Jewlicious THE Jewish Blog | The Daily Information Security Dose | Scoop.it
Joerg Asma's insight:

I like the way they visualize it!

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Anonymous Genetic Profiles Aren't Completely Anonymous

Anonymous Genetic Profiles Aren't Completely Anonymous | The Daily Information Security Dose | Scoop.it
Human genomes are a boon to medical research, but pose privacy risks.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Data breach notification — A guide to handling personal information security breaches - OAIC

Data breach notification — A guide to handling personal information security breaches - OAIC | The Daily Information Security Dose | Scoop.it
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Global Economic Crime Survey, 2014: Key Highlights from the U.S.

Global Economic Crime Survey, 2014: Key Highlights from the U.S. | The Daily Information Security Dose | Scoop.it
Global Economic Crime Survey, 2014: Key Highlights from the U.S.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Profiling hacking for hire services offered in the underground

Profiling hacking for hire services offered in the underground | The Daily Information Security Dose | Scoop.it
Security expert Dancho Danchev profiled hacking for hire services offered in the underground, providing an indication of their prices.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Malvertising: A Growing Threat at the Start of 2014 - InfoSec Institute

Malvertising: A Growing Threat at the Start of 2014 - InfoSec Institute | The Daily Information Security Dose | Scoop.it
Word Meaning The term "malvertising" is coined through the combination of two words – "malware" (i.e., "malicious software") and "advertising." Diagram 1 A
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Launch of the Cybersecurity Framework -- What’s Next? | The White House

Launch of the Cybersecurity Framework -- What’s Next? | The White House | The Daily Information Security Dose | Scoop.it
After a year-long sprint, the Department of Commerce’s National Institute of Standards and Technology (NIST) published the finalized version of the first Framework for Improving Critical Infrastructure Cybersecurity.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Interaktive Grafik: Hier sitzen die Spähwerkzeuge der NSA - SPIEGEL ONLINE

Interaktive Grafik: Hier sitzen die Spähwerkzeuge der NSA - SPIEGEL ONLINE | The Daily Information Security Dose | Scoop.it
Dem SPIEGEL liegt ein interner Katalog der NSA vor, in dem Technikspezialisten Ausrüstung feilbieten. Klicken Sie sich hier durch die Dokumente und das Angebot - Preise inklusive.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Major Internet of Things cyberattack uncovered | Information Age

Major Internet of Things cyberattack uncovered | Information Age | The Daily Information Security Dose | Scoop.it
More than 750,000 phishing and spam emails have been launched from 'thingbots' including televisions and fridges
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Attacking Tor: how the NSA targets users' online anonymity

Attacking Tor: how the NSA targets users' online anonymity | The Daily Information Security Dose | Scoop.it
Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Probleme und Strategie: Cyber Security zwingt CIOs zum Umdenken - CIO.de

Probleme und Strategie: Cyber Security zwingt CIOs zum Umdenken - CIO.de | The Daily Information Security Dose | Scoop.it
Das Prinzip "Harte-Schale-weicher-Kern" taugt nicht mehr angesichts einer Cloud-basierten, datenintensiven, mobilen und ständig vernetzten Welt. Mathieu Poujol von PAC erläutert in seiner Kolumne, wie CIOs ihre Cyber Security neu aufstellen können.
more...
No comment yet.
Rescooped by Joerg Asma from Information Security & more
Scoop.it!

Understanding the Heartbleed Bug

Understanding the Heartbleed Bug | The Daily Information Security Dose | Scoop.it
Probably the easiest-to-understand explanation you can find about the wildly and dangerously popular heartbleed bug.

Via Willi Kraml
Joerg Asma's insight:

i like the simplicity of his report....

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Tweet from @blackplans

Tweet from @blackplans | The Daily Information Security Dose | Scoop.it
What exactly is a #Cybercrime Index? Like a stock market? "We're advising you sell botnets & buy stolen credit cards" pic.twitter.com/jaU7G3tLUk
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

'Pony' botnet steals bitcoins, digital currencies: Trustwave | Reuters

'Pony' botnet steals bitcoins, digital currencies: Trustwave | Reuters | The Daily Information Security Dose | Scoop.it
BOSTON (Reuters) - Cyber criminals have infected hundreds of thousands of computers with a virus called Pony to steal bitcoins and other digital currencies, in the most ambitious cyber attack on virtual
Joerg Asma's insight:

Interesting combination: Somebody steals something most of the nations do not accept: BitCoins. Nevertheless the user looses real money. How does law enforcement / police etc react in case that someone will be arrested?

more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

What Cybercrime Is Costing U.S. Companies - NBC News

What Cybercrime Is Costing U.S. Companies - NBC News | The Daily Information Security Dose | Scoop.it
Companies everywhere are increasingly vulnerable to cybercrime, but U.S. companies appear to be even more threatened than most, says a new report.According t...
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

The number of data breaches in 2013 tripled ... and much more

The number of data breaches in 2013 tripled ... and much more | The Daily Information Security Dose | Scoop.it
Risk Based Security-the Open Security Foundation issued a report to provide a summary of the key findings from analysis of 2013 data breaches
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

CyberSecurity Takes Centerstage Risks, Guidance, and Regulator Wrath

CyberSecurity Takes Centerstage Risks, Guidance, and Regulator Wrath | The Daily Information Security Dose | Scoop.it
Cybersecurity, back in the news NIST, one of the most useful government agencies most compliance officers never encounter, just published a new framework for managing such risks. The SEC and Congress are on the warpath for companies to manage cybersecurity more effectively. How can compliance officers help put together an effective risk management program Editor Matt Kelly has some thoughts.
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

800M exposed records make 2013 record year for data breaches

800M exposed records make 2013 record year for data breaches | The Daily Information Security Dose | Scoop.it
Despite oft repeated claims that the insider threat is the one organizations should be looking out for, the numbers and statistics related t...
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

5 Surprising Security Gains Achieved From Security Analytics -- Dark Reading

5 Surprising Security Gains Achieved From Security Analytics -- Dark Reading | The Daily Information Security Dose | Scoop.it
Getting the most out of big data sets and seemingly unrelated security information
more...
No comment yet.
Rescooped by Joerg Asma from Higher Education & Privacy
Scoop.it!

Twenty Privacy Bills to Watch in 2014

Twenty Privacy Bills to Watch in 2014 | The Daily Information Security Dose | Scoop.it

From electronic surveillance to healthcare privacy to drones, Congress is planning to consider a wide range of privacy legislation this year.   The Edward Snowden leaks about the National Security Agency and the recent data breaches at retailers are likely to keep privacy and data security on the top of many lawmakers’ agendas.  Here is a summary of twenty pending privacy-related bills to keep an eye on during the remainder of the 113th Congress.


Via Higher Ed InfoSec Council
more...
No comment yet.
Scooped by Joerg Asma
Scoop.it!

Introduction to the Business of Stolen Card Data - InfoSec Institute

Introduction to the Business of Stolen Card Data - InfoSec Institute | The Daily Information Security Dose | Scoop.it
Introduction I receive many questions from people who don’t work in the security field about the use of stolen credit card data in the cyber-crime ecosystem, so I decided to provide more information, starting from the clamorous data breach of the...
more...
No comment yet.