Trace routes may show University Enterprise Routers have hops with High Latency/Loss

Staff from the Office of the Vice Provost for IT, Telecommunications and Network Services have been actively working on a problem with the University Enterprise Network. Periodically Line cards on 100G Interconnects have a high cpu utilization. Staff at this point have done extensive testing and have determined that traffic transiting though the router links […] more…

Brazilian Hackers Using RDP to Spread Xpan Ransomware

Brazilian cybercriminals are expanding their tactics and have recently adopted ransomware as a new means of attack, Kaspersky Lab reveals. read more more…

We don’t need more InfoSec analysts: We need analysts to train AI infrastructures to detect attacks

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Everyone says there is an information security talent gap. In fact, some sources say the demand for security professionals exceeds the supply by a million jobs. Their argument is basically this: attacks are […] more…

ISC updates critical DoS bug in BIND DNS software

The Internet Systems Consortium (ISC) patched two vulnerabilities in domain name system software BIND, one of which was referred to as a “critical error condition” in the software. BIND is the most commonly deployed DNS server on the internet, translating domain names into IP addresses so that users can access applications and remote servers without […] more…

Android malware that can infiltrate corporate networks is spreading

An Android malware is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. DressCode, a family of Android malware, has been found circulating in at least 3,000 Trojanized apps, security firm Trend Micro said on Friday. DressCode hides itself inside games, user interface themes, and phone optimization […] more…

By 2020, your Wi-Fi-connected car will pay for parking, gas

Wi-Fi communications in vehicles, whether from the factory or in aftermarket devices, will increase from 6.9 million per year in 2015 to 61 million per year in 2020 — and this will usher in a new era of consumer services and applications, according to a new report from Gartner. Over the next four years, the […] more…

Spotlight: How Softwear Systems Provides Drupal Security

In the early 1980’s Softwear Systems opened up as a custom software company in Chicago. Over the years, its founder Mitch Meyers, learned how to create and manage great websites. Today, the company focuses on providing effective Drupal web development for their clients. At one point, Softwear had a client who worked for a branch… […] more…

Resolved: Penn State Schuylkill Router Upgrade

The upgrade is complete and all services are back to normal operation. more…

Firefox blocks websites with vulnerable encryption keys

To protect users from cryptographic attacks that can compromise secure web connections, the popular Firefox browser will block access to HTTPS servers that use weak Diffie-Hellman keys. Diffie-Hellman is a key exchange protocol that is slowly replacing the widely used RSA key agreement for the TLS  (Transport Layer Security) protocol. Unlike RSA, Diffie-Hellman can be […] more…

Encryptor RaaS Shuts Down Without Releasing Master Key

Security researchers earlier this year managed to zero-in on the Encryptor Ransomware-as-a-Service (Raas), which forced the developer to shut down the operation, but without releasing the master key to help victims. read more more…

Europe Cracks Down on Export of Surveillance Technologies

The European Union has published its proposal (PDF) for a revised Regulation on the export of dual use goods. read more more…

Sensitive FDA Systems at Risk of Cyberattacks: Audit

A report made available this week by the U.S. Government Accountability Office (GAO) shows that the Food and Drug Administration (FDA) needs to address some serious cybersecurity weaknesses that expose industry and public health data. read more more…

Japanese man arrested for selling jailbroken iPhones

He allegedly sold iPhones with a difference – pre-jailbroken and loaded with a popular game hacked to have handy powerups built in… more…

How analytics can protect you from Amy Schumer (malware)

This was interesting in so many ways, this week McAfee issued a report showing how malware delivery using compromised websites and gaming Google search analytics has suddenly become a lot smarter. What these criminals are doing is they are watching trends and then positioning their assets against the trends to the sites that pop to […] more…

Yahoo! Doesn’t Revoke iOS Mail Access After Password Change

Users resetting their Yahoo! passwords might also want to check the list of authorized apps and devices, because iOS Mail will continue to have access to the account even after a password reset, researchers discovered. read more more…

Ransomware spreads through weak remote desktop credentials

Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they’ve also become a common distribution method for file-encrypting ransomware. In March, researchers discovered a ransomware program dubbed Surprise that was being installed through stolen credentials for TeamViewer, a popular remote administration tool. But the trend had started […] more…

Powered by WordPress | Fluxipress Theme | Unlimited Hosting from 1$ | Cheap .com, .net, .eu domains | VPS from 3$ | Show your IP address, check blacklists