WHY ARE YOU WORRIED?
Tim&Larry

Ashley Madison Hackers Release a Second Data Dump

Take a look at these top stories from our blog :

Asset Inventory – What’s on Your Network?
Can you honestly say you know where every asset is located on your network? Most IT professionals would be honest and say that this was not the case. Can you really afford to not know where they are? Here are some tips.

Stagefright 2: ‘High Severity’ Android Vulnerability Discovered.
Stagefright, the notorious Android vulnerability that just won’t quit, has another vulnerability joining the ranks after an independent security research firm discovered a new ‘high-severity’ vulnerability that affects nearly every android device currently in use.

Decades Old Rootkit Exploit Discovered in Intel Processors!
A Researcher makes a sensational claim after discovering Intel and AMD processors to be vulnerable due to a fundamental design flaw dating back to 1997..

Researchers Uncover a New Android SMS Vulnerability
Two researchers have revealed vulnerabilities in the way Google’s OEM partners sign certificates to access remote support tools, with malicious applications now having the means to completely hijack and control nearly all Android phones.

Security Researchers Hack a Tesla Model S, Expose Vulnerabilities
Two security researchers have devised an exploit to force a Tesla model S to power down and come to a halt by physically accessing the vehicle through an onboard computer plugged into the dashboard of the vehicle.

Microsoft Raises Bug Bounty Program Reward to $100,000!
Microsoft has increased the reward for its bug bounty program and has also added more eligible software and perks to the program in an effort to entice developers and security researchers.

China Read Emails of Top U.S. Officials since April 2010
China’s cyber spies have successfully hacked into the private emails of top U.S. officials, according to reports obtained by NBC News.



Interesting Reading From Around the Web:

Angering The King Of Sweden, Flaunting Fake Females And Other Bonkers Ashley Madison Marketing Ploys
Data breaches aren’t easy for companies working in one location, but imagine trying to control the chaos while managing various franchises across the country. Not only do security systems and controls differ from one location to another, but local culture, individual communication strategies and security policies likely differ, too..

Tech Firm Ubiquiti Suffers $46M Cyberheist
Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers.

OPM Delays Breach Notifications
The majority of the 21.5 million current and former federal employees, including some with the NCUA, whose data was compromised as a result of the catastrophic Office of Personnel Management breach should be notified that they were affected by Thanksgiving. Is that soon enough?




Meet LIFARS



Michal Nemcok

Michal Nemcok is the PR and Marketing Manager at LIFARS. Michal oversees the PR and digital marketing efforts, including content marketing, social media marketing, email marketing, thought leadership, media placement, and more. He develops marketing strategies and ensures that all of the channels seamlessly come together to create widespread brand awareness and establish LIFARS as a leader in the cybersecurity space.



Contact Michal




Featured Article:



At What Point Do White Hat Hackers Cross the Ethical Line?

There is a lot of controversy around certain aspects of white hat hacking and where the lines of ethics should be drawn. The recent example of Chris Roberts and his alleged plane hacking raise some valid concerns about the methods and reasoning used by white hat hackers.

Continue reading





Featured Service:



Incident Response

"We've been breached" - words no executive ever wants to hear. The reality, however, is that sooner or later, your organization will get breached and its ability to cope with this emergency crisis situation will get tested. To ensure it doesn't crumble under the pressure, LIFARS' elite Incident Response team will assist you with managing the crisis properly.



Find out more





Upcoming Events:



IBM I2 Summit for a Safer Planet

Join us at the IBM I2 Summit for a chance to leearn about new approaches to combating cybercrime and for a chance to see Ondrej Krehel and our good friends Joseph Loomis and Ed Cabrera talk about advanced Incident Response.
September 1-2, 2015, Washington, DC.



Find out more



Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.