Vendor Patches:
- Google Releases Security Update for Chrome
- Cisco Releases Security Update
- Oracle Releases Security Bulletin
- Apple Releases Multiple Security Updates
- Drupal Releases Security Advisory
Security Breaches:
- Disney Playdom forums shut down following data breach
- Pokémon GO Creator’s Twitter Account Hacked
- North Korean hackers gain access to personal data of dozens of South Korean diplomats and security officials
- Clash of Kings official forum hacked, data of 1.6 million accounts leaked
- Hillary Clinton’s Presidential Campaign also Hacked in Attack on Democratic Party
Malware News:
- Interpol, Intel and Kaspersky join hands to end ransomware attacks
- Europol Declares War on Ransomware
- Kovter Trojan Gets New Persistence Mechanism
- Decryption Tools Released for Bart, PowerWare Ransomware
Security News:
- DDoS attacks rise by 83% globally in Q2 with Russia as top target
- KeySniffer Lets Hackers Steal Keystrokes from Wireless Keyboards
- SSL Flaw in Intel Crosswalk Exposes Apps to MitM Attacks
- Danger Drone: The hacker laptop that takes flight
- Malvertising campaign AdGholas targeted 1 million victims per day
- Wikileaks releases 20,000 DNC Emails
- Hackers could access your passwords after finding LastPass security flaw
- iPhone Can Be Hacked Remotely With Just A Message
- Vulnerabilities in SAP HANA Impact Over 10,000 Customers
- Vulnerabilities Found in Osram Smart Lighting Products
- SMS-based two factor authentication is insecure and should be banned, warns US standards body
- Amazon Kindle Browser Exposed Searches to MitM Attacks
- PayPal Abused in Banking Trojan Distribution Campaign
- Ubuntu Linux Forum Hacked
Telecom Security Assessment
The Telecom sector has witnessed huge growth especially in emerging economies of Asia, Africa and South America. This has resulted in rapid expansion of the network, addition of value-added services, and resultant increase in complexity of the entire setup. Often, security can get overlooked or kept on the backburner in the rush to increase market share and reduce costs. However, cyber-criminals don’t care for such economic realities, and they have begun to increasingly target telecom infrastructure, especially as it becomes IP-based with the arrival of LTE.
This combined with increasing regulations towards telecom security have created quite a challenge that telcos are seeking to address. Our experience with telcos have revealed that while there are a variety of security issues read more…
The NII SOC Team
To know more, contact us at:
E-mail: team. soc@niiconsulting.com
Web: www.niiconsulting.com