Super Hero like Speed on DXL
Speed and Agility Superheroes are part of the lore of American culture — the thought of human-being acquiring superhuman power such as flight, invisibility, breathing underwater has always been intriguing to many. The thought of speed and agility is one of those sets of powers that has caught a lot of attention — the ability […] more…GDPR: A Nudge We Need?
I think it’s time for a somewhat more balanced and optimistic view of the EU’s impending General Data Protection Regulation (GDPR). When the new regulation takes effect in May 2018 it will eliminate the confounding thicket of outdated local rules that has grown up under the 1995 Data Protection Directive. It will replace them with […] more…If we can’t trust technology we won’t (and shouldn’t) use it
Walking this year’s Mobile World Congress I am no longer thrown by the devices, gadgets and flashy booths, but completely mystified at how we as an industry continue to hype up the idea of a truly connected world without addressing one of the most important pieces – security. As someone who’s been in the industry […] more…RATANKBA: Delving into Large-scale Watering Holes against Enterprises
In early February, several financial organizations reported malware infection on their workstations, apparently coming from legitimate websites. The attacks turned out to be part of a large-scale campaign to compromise trusted websites in order to infect the systems of targeted enterprises across various industries. The strategy is typically known as a “watering hole” attack. It […] more…How Security Products are Tested – Part 1
The demand for tests appeared almost simultaneously with the development of the first antivirus programs – in the mid-to-late 1990s. Demand created supply: test labs at computer magazines started to measure the effectiveness of security solutions with the help of self-made methodologies, and later an industry of specialized companies emerged with a more comprehensive approach […] more…Mobile apps and stealing a connected car
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimedia systems (music, maps, and films are available on-board in modern luxury cars) but also car key systems in both literal and figurative senses. By using […] more…Large Healthcare Company Standardizes on McAfee ENS 10.5 and McAfee MOVE AntiVirus to Protect 100,000+ Physical and Virtual Endpoints
Security Engineer Scott M. knows that for organizations like his, a large North American healthcare company, information security defenses must continually adapt to face new threats and to accommodate business or industry changes—else risk dire consequences. That is why his company is beefing up its endpoint defenses by migrating from another vendor’s endpoint protection solution […] more…Breaking The Weakest Link Of The Strongest Chain
Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the […] more…Growing Cybersecurity Efficiencies through the Intel Security Innovation Alliance
Starting in the New Year, Intel Security has outlined a new, unifying approach for the cybersecurity industry to mend fragmentation through updated integrated solutions, new cross-industry partnerships and product integrations within the Intel Security Innovation Alliance. The Intel Security Innovation Alliance partners have been collaborating closely with us on technology integrations that provide our customers […] more…Lurk: Retracing the Group’s Five-Year Campaign
by Fyodor Yarochkin and Vladimir Kropotov (Senior Threat Researchers) Fileless infections are exactly what their namesake says: they’re infections that don’t involve malicious files being downloaded or written to the system’s disk. While fileless infections are not necessarily new or rare, it presents a serious threat to enterprises and end users given its capability to […] more…STAR- A Window to the Cloud
We are all going to live in the cloud. Well that is what every study, and forecast tells us. From our clash of clans villages, to our connected cars we can expect all of our data to be hosted in an unmarked data center in a town that we have never heard of. Perhaps this […] more…“Troyanización” de Aplicaciones Legítimas en Aumento
El reciente Informe de Amenazas de McAfee Labs: Diciembre de 2016, ilustra cómo los atacantes están creando malware difícil de detectar infectando código legítimo con troyanos, y aprovechando esa legitimidad para que permanezcan ocultos tanto tiempo como sea posible. El autor, Craig Schmugar de McAfee Labs, también recomienda políticas y procedimientos que le ayudarán a […] more…Do web injections exist for Android?
Web injection attacks There’s an entire class of attacks that targets browsers – so-called Man-in-the-Browser (MITB) attacks. These attacks can be implemented using various means, including malicious DLLs, rogue extensions, or more complicated malicious code injected into pages in the browser by spoofing proxy servers or other ways. The purpose of an MITB attack may […] more…How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s ‘Switcher’ malware’s motto – the newest Android Trojan threat. It uses unsuspecting Android devices as tools to redirect all traffic from Wi-Fi connected devices on a given network to one owned by a cybercriminal, putting […] more…Is Mirai Really as Black as It’s Being Painted?
The Mirai botnet, which is made up of IoT devices and which was involved in DDoS attacks whose scale broke all possible records, causing denial of service across an entire region, has been extensively covered by the mass media. Given that the botnet’s source code has been made publicly available and that the Internet of […] more…Kaspersky Security Bulletin 2016. Story of the year
Download the PDF Introduction In 2016, ransomware continued its rampage across the world, tightening its hold on data and devices, and on individuals and businesses. The numbers speak for themselves: 62 new ransomware families made their appearance. There was an 11-fold increase in the number of ransomware modifications: from 2,900 new modifications in January/March, to […] more…More information
- How to delete your old, embarrassing, now-much-easier-to-find tweets
- Drone owner fined for putting police helicopter crew ‘in danger’
- Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking
- States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities
- How to Improve Your Chances of Staying Out of the Insider Threat Headlines
- Browser Makers Delay Removal of TLS 1.0 and 1.1 Support
- Apple preps for iPhone diversification
- Sony Deletes Tweets on Britney Spears’s Death, Blames Hackers
- Facebook Says 87 Million May be Affected by Data Breach
- Maintenance to TSM Server (saverestore.its.psu.edu)