Researchers Demo Remote Hacking of Industrial Cobots

Researchers at security firm IOActive have shown how a remote attacker can hack an industrial collaborative robot, or cobot, and modify its safety settings, which could result in physical harm to nearby human operators. read more more…

Resolved: PASS problem

All affected services have been restored as of 1:52pm. more…

Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?

“Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review   When the Verizon Data Breach Investigation Report started reporting “time to” metrics […] more…

News in brief: AWS buckets leak more data; NHS hit by hacker; ‘Mr Smith’ may publish GoT episodes

Your daily round-up of some of the other stories in the news more…

DDoS Threat Increases While Mirai Becomes ‘Pay-for-Play’

The DDoS threat is increasing again. Pbot can generate 75 Gbps from just 400 nodes and Mirai has been commoditized. However, despite the growing number of attacks, the overall trend seems to be for more frequent, smaller attacks. These are the primary takeaways from a new Q2 study into internet traffic. read more more…

Evasion Techniques in Phishing Attacks

We all know that we shouldn’t click on links from sketchy looking emails. But what if the website you’re viewing takes you to a spoofed page at the Apple ID store and asks for your login information to proceed? This tactic is called phishing, and attacks are exponentially on the rise. Used by hackers to […] more…

US appeals court curbs police power to seize cellphones

A ruling from an appeals court judge has raised questions about privacy, device security, and how law enforcement conducts investigations more…

PASS problem

Penn State IT staff are working on a problem with PASS that started around 9:02 am this morning. Some users may have trouble reaching files in PASS. Web servers such as www.personal.psu.edu may be slow or unresponsive. more…

Demystifying Machine Learning: How to Turn the Buzzword into Real Benefits for Endpoint Security

Machine learning has become the most popular new theme in security. Seemingly every vendor is adopting this capability in an attempt to either keep up or to make their product stand out in a crowded market. This creates confusion, because the term itself is often misunderstood, and the implications of its use are varied. Not […] more…

Neptune Exploit Kit Used to Deliver Monero Miner

Cybercriminals have been using the Neptune exploit kit to deliver cryptocurrency miners via malvertising campaigns, FireEye reported on Tuesday. read more more…

‘Smart’ solar power inverters raise risk of energy grid attacks

Researcher identifies a weakness in the software layer – and reminds us that we’re placing a lot of trust in vendors to implement decent security in formerly passive devices more…

Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub

You’re a jerk. You’re a fat pig. You’re disgusting.  It’s hard to imagine seeing these words written about anyone, but it happens every minute online. But hopefully, Instagram users will be noticing a kinder vibe thanks to the platform’s decision to automatically delete hateful, bullying comments. Instagram, the third most popular social network with 700 […] more…

Fake news: Mozilla joins the fight to stop it polluting the web

How much responsibility do we bear for our own media literacy, and how much effort should firms like Mozilla, Google, Snopes, Facebook and others put into tackling fake news? more…

Several Flaws Patched in Fuze Communications Platform

Fuze has patched several vulnerabilities discovered by Rapid7 researchers in a component of its cloud-based unified communications platform. The flaws could have been exploited to obtain sensitive data and launch brute-force attacks on the administration interface. read more more…

How to Make Friends and Influence People (in InfoSec)

After a particularly strange exchange with a new connection on LinkedIn I felt the need to write a post on my profile calling out bad behavior. I clearly struck a nerve, as I received several notes asking me how someone should make a connection request, and subsequent invitations to connect. After responding to a few […] more…

Foxit backtracks after declining to fix zero-days exposed by ZDI

If you use Foxit’s PDF reader, make sure you update – and stick with Safe Reading mode until you do more…

2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News