Software and Network Cybersecurity
Network Vulnerability Assessment
News and Cyber Threats
IS Risk-based Audit
Quality Management System
Quality Assurance Risk-based Audit
Certification Exam Preparation
The new version of ISO 9001 follows a new, higher level structure to make it easier to use in conjunction with other management system standards, with increased importance given to risk. ISO 9000:2015, which defines the concepts and language used throughout the ISO 9000 family of standards, is also released. ISO certification bodies have three years to migrate certificates to the new ISO 9001:2015 version. These Quality Management Training Courses can help you manage and improve your business.
The September SANS OUCH! Security Awareness Newsletter explains the most common email mistakes and how to avoid them. Read More
tags: SANS OUCH! Security Awareness Newsletter
Wireshark 2.2 is now available as the newest version of this widely-used packet analyzer. Release highlights of Wireshark 2.2 include support for SSL or TLS over TCP for the "Decode As" feature, the ability to disable coloring rules, the implementation of the "-d" to mimic TShark functionality, export of packets in JSON format, and support for "-j", "-J", and "-l" flags. Read More
tags: Wireshark 2.2, TShark, network analyzer, packet analyzer
President Obama has announced the first Chief Information Security Officer to drive cybersecurity policy, planning, and implementation across the Government. Brigadier General Gregory J. Touhill is currently the Deputy Assistant Secretary for Cybersecurity and Communications in the Office of Cybersecurity and Communications (CS&C) at the Department of Homeland Security (DHS). In his new role as Federal CISO, Greg will leverage his considerable experience in managing a range of complex and diverse technical solutions at scale with his strong knowledge of both civilian and military best practices, capabilities, and human capital training, development and retention strategies. Read More.
tags: Federal Chief Information Security Officer, CISO, Brigadier General Gregory J. Touhill
Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen. According to Cisco, Facebook scams were the most common form of malware distributed in 2015; the FBI said that social media-related events had quadrupled over the past five years; and PricewaterhouseCoopers found that more than one in eight enterprises suffered a security breach due to a social media-related cyber attack. View the Report
tags: Cisco 2015 Midyear Security Report, Facebook, social media, LinkedIn, Twitter
Kimpton Hotels on Wednesday formally acknowledged that malware found on payment terminals in many of its hotels and restaurants may have compromised credit/debit cards of guests who patronized the properties in the first half of this year. Read More
tags: Kimpton Hotels, payment terminal malware, compromised credit/debit cards
Hackers claim to have stolen attack code from a team of sophisticated cyber spies known as the "Equation Group”, widely believed to be associated with the National Security Agency. The hackers have offered to sell the exploits to the highest bidder in an online Bitcoin auction. The "teaser" files appear to date back to June 2013 and the file names, such as “BANANAGLEE”, “EPICBANANA”, and “JETPLOW” are consistent with NSA programs leaked by whistleblower Edward Snowden. Read More
tags: NSA Allegedly Hacked, National Security Agency NSA, Bitcoin, Edward Snowden, BANANAGLEE, EPICBANANA, JETPLOW
The SANS Securing The Human Creating a Cyber-Secure Home poster walks families through the five key steps on how to create a cyber secure home. What makes this poster so powerful is these are the same secure behaviors that most organizations want employees to exhibit at work. SANS Securing The Human, a division of the SANS Institute, provides organizations with a complete and comprehensive security awareness solution, enabling them to easily and effectively manage their human cybersecurity risk. Cyber-Secure Home
tags: SANS Creating a Cyber Secure Home, Securing The Human, security awareness
Two critical vulnerabilities were disclosed but remain unpatched in a large percentage of Android devices, while malicious apps were downloaded as many as 2.5 million times from Google Play. However, a large percentage of Android phones aren't eligible to receive the fixes.
tags: Google Play malicious apps, Android critical vulnerabilities Read More
Samsung will recall Galaxy Note 7 because of exploding batteries. This recall affects over 2.5 million units. Samsung issued the following statement.
In response to recently reported cases of the new Galaxy Note 7, we conducted a thorough investigation and found a battery cell issue. To date (as of September 1) there have been 35 cases that have been reported globally and we are currently conducting a thorough inspection with our suppliers to identify possible affected batteries in the market. However, because our customers’ safety is an absolute priority at Samsung, we have stopped sales of the Galaxy Note 7. For customers who already have Galaxy Note 7 devices, we will voluntarily replace their current device with a new one over the coming weeks.
tags: Samsung Galaxy Note 7 Recall, Galaxy Note 7 exploding batteries, Samsung Read More
Apple has issued OS X security updates to fix critical zero-day vulnerabilities in El Capitan (2016-001) and Yosemite (2016-005) desktop operating systems and Safari web browser. The vulnerabilities were revealed in a troubling report that also detailed how a shadowy firm named the NSO Group had been exploiting the vulnerabilities to spy on targeted individuals.
tags: Apple OS X, Trident, El Capitan, Yosemite, Safari, CVE-2016-4655, CVE-2016-4656 Read More
The ‘Anniversary Update’ is the largest Windows 10 upgrade so far. It is compulsory, but as it began rolling out, reports followed that the mega update is causing PCs to freeze, delivering the Microsoft Blue Screen of Death (BSOD).
tags: Windows 10 Anniversary Update, Microsoft, BSOD Read More
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. You can help protect your system by installing an update from Microsoft.
tags: Microsoft Internet Explorer 11 vulnerability, Microsoft Security Bulletin MS16-095, BSOD Get Update
Microsoft Internet Explorer and Edge are prone to a remote memory-corruption vulnerability due to a use-after-free error. Specifically, this issue occur within the 'CAnchor' object. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Internet Explorer 11 and Edge are vulnerable.
tags: Microsoft Internet Explorer 11 vulnerability, Microsoft Edge vulnerability, CVE-2016-3289, BSOD Get Update
|DNS Leak Test|
|More Info About You|
|Myip Live Whois IP|