“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security
Information security is the central political question of our times. Security pros know well that grappling with these issues requires us to develop a tough mental attitude, both individually and collectively. No amount of security mitigation matters if your despair or optimism clouds your judgement about the effectiveness of that mitigation. [ Keep up with […] more…5 Simple But Powerful Career Tips
Getting ahead in your career doesn’t happen by accident. It requires planning and constant pursuit. That’s why working for a company that invests in you, truly wants you to succeed and enables you to grow personally and professionally makes a big difference in your career progression. This week McAfee hosted our first-ever CMO Development Forum […] more…5 Reasons Why Strong Digital Parenting Matters More than Ever
As a parent raising kids in a digital culture, it’s easy to feel at times as if you have a tiger by the tail and that technology is leading your family rather than the other way around. But that familiar feeling — the feeling of being overwhelmed, outsmarted, and always a step or two behind […] more…Pentagon CIOs struggle with legacy tech, security. Sound familiar?
Patrick Flanders has been thinking a lot about IT modernization. Flanders, CIO of the Defense Health Agency, is gearing up to consolidate control over the Pentagon’s sprawling network of treatment centers, in the process centralizing a far-flung set of IT operations that raise a host of security and device-management considerations. [ Learn from your peers: […] more…Resolved: Penn State Account Systems will be unavailable
This issue has been resolved, and Penn State Account Systems have been restored to normal functionality. ORIGINAL ALERT: PEOPLE AND LOCATIONS IMPACTED: All students, faculty, and staff at all Penn State locations IT SERVICE(S) IMPACTED: Penn State Account systems (see list below) will be unavailable DATE AND TIME: Penn State Account Systems will be affected […] more…Update: Wireless will be unavailable at several University Park locations
PEOPLE AND LOCATIONS IMPACTED: All students, faculty, and staff at University Park locations listed below IT SERVICE(S) IMPACTED: Wireless will be unavailable DATE AND TIME: Wireless will be affected from 5:00 AM ET on 09/25/2018 until 7:00 AM ET on 09/25/2018. NOTES: Each building listed below should expect a 5-10 minute outage during the maintenance […] more…Update: Penn State Account Systems will be unavailable
Update: WebAccess will up and functional during this scheduled maintenance. Penn State IT will be deploying an updated version of WebAccess, but it will not be down during the scheduled maintenance. PEOPLE AND LOCATIONS IMPACTED: All students, faculty, and staff at all Penn State locations IT SERVICE(S) IMPACTED: Penn State Account systems (see list below) […] more…Penn State Account Systems will be unavailable
PEOPLE AND LOCATIONS IMPACTED: All students, faculty, and staff at all Penn State locations IT SERVICE(S) IMPACTED: Penn State Account systems (see list below) will be unavailable DATE AND TIME: Penn State Account Systems will be affected from 2:00 AM ET on 09/15/2018 until 12:00 PM ET on 09/15/2018. NOTES: CPR, Friends of Penn State, […] more…Digital Literacy Decoded – Time to Reprise Our Roles as Digital Citizens
Celebrated every year on September 8, this year’s theme for International Literacy Day focused on “Literacy and Skills Development.” And this made me instantly think of digital literacy and why we need to push digital skill development among the populace. It does not take much time to move from pen and paper to keyboard and […] more…A Closer Look at the Locky Poser, PyLocky Ransomware
by Ian Kenefick (Threats Analyst) While ransomware has noticeably plateaued in today’s threat landscape, it’s still a cybercriminal staple. In fact, it saw a slight increase in activity in the first half of 2018, keeping pace by being fine-tuned to evade security solutions, or in the case of PyLocky (detected by Trend Micro as RANSOM_PYLOCKY.A), […] more…Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum
by Fyodor Yarochkin (Senior Threat Researcher) We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring. Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian […] more…Threat Landscape for Industrial Automation Systems in H1 2018
For many years, Kaspersky Lab experts have been uncovering and researching cyberthreats that target a variety of information systems – those of commercial and government organizations, banks, telecoms operators, industrial enterprises, and individual users. In this report, Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the findings of its […] more…Salute to Teachers – The Architects of Tomorrow’s Digital India
The digital whiteboards have long replaced the squeaky blackboards, while emails and text messages are replacing messages pinned on the display boards in the corridors. Today, many schools have a Bring Your Own Device (BYOD) policy, making notebooks redundant. The education pattern is itself changing from general rote learning for all to the ‘Discovery’ methods. […] more…10 topics every security training program should cover
The weakest link Image by Getty Images Every IT security professional is well aware that a thorough end-user education program is a necessary weapon in the battle to protect your perimeter. A good education program trains your vulnerable humans to understand how to help defend your system from attack. Education helps people develop healthy habits, […] more…The Urpage Connection to Bahamut, Confucius and Patchwork
By Daniel Lunghi and Ecular Xu In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes. In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, […] more…12 things every IT security professional should know
Fighting back Image by Getty Images Few complex professions change with the velocity of IT security. Practitioners are faced with an average of 5,000 to 7,000 new software vulnerabilities a year. That’s like springing 15 new leaks in your defenses every day. That’s on top of the tens of millions of unique malware programs that […] more…More information
- 2013 Cyber Risk Report
- Fiber cables made of air move data at 99.7 percent the speed of light
- SAP Patches XSS, DoS Vulnerabilities
- Security Firms Say Evidence Seems to Confirm Oracle Cloud Hack
- Rogue Ads Redirect Visitors
- Rescue CD Beta released
- Most People Expect a Serious Cyberattack Against Their Country
- WhatsApp fights the spread of deadly fake news with recipient limit
- Garfield Garfield True, or the story behind Syrian Malware, .NET Trojans and Social Engineering
- Cisco Patches Zero-Day Flaw Affecting Routers and Switches