Researchers Create PoC Malware for Hacking Smart Buildings
Researchers at IoT security company ForeScout have created a piece of malware to demonstrate how malicious actors could remotely hack into smart buildings. read more more…Netanyahu Says Israel Ready to Thwart Election Cyber Meddling
Israeli Prime Minister Benjamin Netanyahu said Wednesday that his country led the world in cyber defence, after a report that an unnamed nation planned to meddle in its upcoming general election. “Israel is prepared to thwart a cyber intervention, we’re prepared for any scenario and there’s no country more prepared than we are,” he told […] more…Quarter of Healthcare Organizations Hit by Ransomware in Past Year: Study
more…Untangle Partners With Malwarebytes to Bring Layered Security to SMBs
Untangle and Malwarebytes Partner to Extend Visibility Across Managed Networks and Endpoints for SMBs read more more…Computer hackers could be thwarted by new ‘deception consistency’ method
Can you deceive a deceiver? That’s the question that computer scientists have recently been exploring. The researchers are looking at how to make cyber deception a more effective tool against malicious hackers. more…Cryptocurrency Mining Malware uses Various Evasion Techniques, Including Windows Installer, as Part of its Routine
by Janus Agcaoili and Gilbert Sison The prodigious ascent of cryptocurrency-mining malware was not only brought about by its high profit potential, but also due to its ability to remain undetected within a system, especially when combined with various obfuscation routines. The concept of a stealthy, difficult-to-detect malware operating behind the scenes has proven to […] more…WhatsApp ‘martinelli’ warning is a hoax, don’t forward it
A WhatsApp chain letter is warning of a malware-packing video called “martinelli”, and selling its lie with a grain of truth. more…Malware Targeting Brazil Uses Legitimate Windows Components WMI and CertUtil as Part of its Routine
by Byron Gelera and Donald Castillo We recently found a malware that abuses two legitimate Windows files — the command line utility wmic.exe and certutil.exe, a program that manages certificates for Windows — to download its payload onto the victim’s device. What’s notable about these files is that they are also used to download other […] more…McAfee Honors 25 Partners with Awards for Excellence & Innovation in Security
Today McAfee, the device-to-cloud cybersecurity company, announced the winners of its distinguished Partner Awards. The awards ceremony, hosted at McAfee’s Americas Partner Summit in Las Vegas, recognized partners who demonstrated the embodiment of three foundational pillars of the McAfee Partner Program: strategic relationships, profitable partnerships and driving better customer outcomes. Partners received awards based on […] more…UK cyber-centre thwarts hostile hackers
UK cyber-centre thwarts hostile hackers l33tdawg Mon, 10/15/2018 – 23:15 more…Apple argues stronger encryption will thwart criminals in letter to Australian government
Apple argues stronger encryption will thwart criminals in letter to Australian government l33tdawg Fri, 10/12/2018 – 23:18 more…Facebook Purges 251 Accounts to Thwart Deception
Facebook on Thursday said it shut down 251 accounts for breaking rules against spam and coordinated deceit, some of it by ad farms pretending to be forums for political debate. The move came as the leading social network strives to prevent the platform from being used to sow division and spread misinformation ahead of US […] more…Rapidly Evolving Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
The GandCrab ransomware, which first appeared in January, has been updated rapidly during its short life, with Version 5.0.2 appearing this month. In this post we will examine the latest version and how the authors have improved the code (and in some cases have made mistakes). McAfee gateway and endpoint products are able to protect […] more…KnowBe4 Brings Artificial Intelligence to Security Awareness Training
It seems that you cannot have a new security product without a machine learning component. It makes sense. Machine learning recognizes patterns and returns probabilities. Risk, and cyber security is all about risk, is also about patterns and probabilities. Binary security is beginning to look a bit old. read more more…Google’s Wear OS 2.0 can’t fix its obsolete smartwatch hardware
Google’s Wear OS 2.0 can’t fix its obsolete smartwatch hardware l33tdawg Fri, 09/28/2018 – 21:52 more…The Art of (Cyber) War: How Adversarial Thinking Strengthens Cybersecurity
Cybersecurity is unique compared to most other business operations, even most IT operations. Unlike marketing or network management—both of which tackle difficult and ever-changing challenges in the business operating environment—cybersecurity pits defenders against intelligent, creative and deliberate opponents. read more more…More information
- Dell Announces New Supply Chain Security Offerings
- US gov official quits after hackers steal 21.5 million people’s data on her watch
- Vulnerability or Not? Pen Tester Quarrels With Software Maker
- Australian National Facial Biometric Matching Capability to maintain privacy safeguards
- McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day
- Disaster is just a click away: Computer scientist, psychologist look at developing visual system to warn Internet users of safety risks
- Healthcare Giant Ascension Hacked, Hospitals Diverting Emergency Service
- This futuristic pill senses signs of disease inside the body, then sends a wireless alert to a phone
- Judge denies blanket right to compel fingerprint iPhone unlocking
- Cybercrime Marketplace Leaks Over 2.1 Million Payment Cards