Resolved: University Park Power Outage

By 9:35 p.m. on Friday, October 20, 2017, Penn State IT staff restored all remaining services. more…

University Park Power Outage

As of 5:54 p.m. on Friday, October 20, 2017, various buildings and dorms at UP experienced a brief power outage. Penn State IT staff members are currently investigating and working on the issue. More information will be shared as it becomes available. more…

Canada’s ‘super secret spy agency’ is releasing a malware-fighting tool to the public

Canada’s electronic spy agency says it is taking the “unprecedented step” of releasing one of its own cyber defence tools to the public, in a bid to help companies and organizations better defend their computers and networks against malicious threats. The Communications Security Establishment (CSE) rarely goes into detail about its activities — both offensive […] more…

The Reaper IoT Botnet Has Already Infected a Million Networks

The Mirai botnet, a collection of hijacked gadgets whose cyberattack made much of the internet inaccessible in parts of the US and beyond a year ago, previewed a dreary future of zombie connected-device armies run amuck. But in some ways, Mirai was relatively simple—especially compared to a new botnet that’s brewing. Tags:  Security more…

Your Browser Could Be Mining Cryptocurrency For a Stranger

There’s something new to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, tricky threat called “cryptojacking,” which secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site. Tags:  Industry News more…

Windows now includes gaming cheat detection at the system level

Developers that want to stop cheaters in their Windows games are getting a little additional system-level help from Microsoft via TruePlay, a new API being rolled out through Windows 10’s Fall Creators Update. Tags:  Security more…

ROCA: Which Key-Pair Attacks Are Credible?

In the past two weeks, we have seen two big encryption issues arise: key reinstallation attacks, called KRACKs; and “Return of Coppersmith’s Attack,” called ROCA. Many CEOs, CIOs, and CISO/CSOs are asking, as they must, “Are we protected?” and “What’s our exposure?” Security architects are scurrying about to identify reasonable responses that can be presented […] more…

Infected Minecraft Apps Could Potentially Turn Over 2 Million Android Devices Into a Botnet Army

We all love a good game, especially those that allow us to create and innovate with the touch of our fingertips. That’s why the video game Minecraft, which allows players to build constructions out of textured cubes, has grown in popularity. It’s become so popular, in fact, that there’s even mobile app versions of the […] more…

Hack-back bill would legalize companies hacking their attackers

What could possibly go wrong? more…

Energy Regulator Acts to Improve Power Grid Security

With growing concern over nation-state cyber attacks comes an increasing need to secure the critical infrastructure. In the Quadrennial Energy Review published in January 2017, the U.S. Energy Department wrote, “Cyber threats to the electricity system are increasing in sophistication, magnitude, and frequency.” The reliability of the electric system underpins virtually every sector of the […] more…

Booz Allen to Acquire AI-based Morphick

Contracting giant Booz Allen is to acquire cybersecurity firm Morphick. Few details have been made public — there is no statement on the price involved nor the future of existing Morphick staff. Nevertheless, this seem to be a good fit for both companies, with Morphick gaining to access to more customers, and Booz Allen moving […] more…

What’s coming next in the world of malware? [VIDEO]

We asked one of the world’s top threat reasearchers, “What next?” Here’s his fascinating reply… more…

Google’s Advanced Protection Program: extra security at a cost

How much hassle would you put up with to make your account more secure? more…

Locky Uses DDE Attack for Distribution

While continuing to spread via spam emails sent by the Necurs botnet, the Locky ransomware has switched to new attack techniques in recent campaigns, in an attempt to evade detection and improve infection rate. read more more…

Driving Security Orchestration with Your Cyber Threat Intelligence Playbook

A newish buzzword in the cybersecurity world is “orchestration”. Which to me is the junction where people, process and technology all come together. It’s where people build automation into process and consume information and insight generated by technology.  read more more…

EquiFIX – Lessons Learned From the Most Impactful Breach in U.S. History

While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization if you were similarly targeted? read more more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News