Millions of Android Devices Hit With CopyCat Malware (McAfee Blogs, Jul 13 2017)
Time and time again, we’ve seen Android malware make its way through mobile devices around the world. Now, a new mobile malware is here, and it has infected at least 14 million Android devices. Dubbed CopyCat, the malware has been found running a successful adware campaign, stealing credits earned by legitimate advertisers in the process……

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far (Security Intelligence, Jul 13 2017)
Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017….

The Sad Tale of the Copycat Hijacker (WhiteHat Security Blog, Jul 13 2017)
As I checked the technology news today I noticed a headline that read “14 million devices infected by the CopyCat Malware last year”…The real issue here is that Google knows about these security flaws and the Play Store actively looks for applications that can exploit this vulnerability. …

Verizon and WWE Data Exposures Come Down to Human Error (Wired Magazine, Jul 15 2017)
What’s behind the recent spat of database vulnerabilities? Good ol’ fashioned human error….

Is there an ‘Alt SIEM’ Market? (Gartner Blog, Jul 14 2017)
Not every solution fits into a neat market box. In the past year or so, I – and I am sure others — have struggled to characterize some vendors who……

How I learned to stop worrying (mostly) and love my threat model (Ars Technica, Jul 08 2017)
Reducing privacy and security risks starts with knowing what the threats really are….

Action Item: SaaS SIEM Users Sought! (Gartner Blog, Jul 19 2017)
As we already mentioned, one of the papers we are writing this quarter would be about (in part) SIEM delivered via a Software-as-a-service (SaaS) model. Let’s call it “SaaS SIEM.”……

Flashback 2014: SIEM Deployment Blueprint Visual (Gartner Blog, Jul 17 2017)
Back in 2014, we tried to create a SIEM “one-pager” that we published as “Blueprint for Designing a SIEM Deployment.” The essence of this short note was a picture that……

$20 antennas can now help breach 256-bit encryption standards – Digital Trends (Digital Trends, Jul 18 2017)
This technique shows hackers don’t need bottomless wallets or even direct access to a system to breach heavy encryption. Security researchers have devised a method of defeating AES-256bit encryption in as little as five……

Sweet Security Supercharged (The State of Security, Jul 19 2017)
Over the past few years, I have spent quite a bit of time trying to figure out a way to monitor what is happening on my home network in the same way that I have grown accustomed to doing so in an enterprise environment. Not happy with what was available on the market, I chose…