8 steps to regaining control over shadow IT
A dangerous practice on the rise Image by Pexels “Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of the IT department. These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to […] more…Malware: 5 Tips for Fighting the Malicious Software
Malware—the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our lives. From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal, the list […] more…Mobile apps and stealing a connected car
The concept of a connected car, or a car equipped with Internet access, has been gaining popularity for the last several years. The case in point is not only multimedia systems (music, maps, and films are available on-board in modern luxury cars) but also car key systems in both literal and figurative senses. By using […] more…Large Healthcare Company Standardizes on McAfee ENS 10.5 and McAfee MOVE AntiVirus to Protect 100,000+ Physical and Virtual Endpoints
Security Engineer Scott M. knows that for organizations like his, a large North American healthcare company, information security defenses must continually adapt to face new threats and to accommodate business or industry changes—else risk dire consequences. That is why his company is beefing up its endpoint defenses by migrating from another vendor’s endpoint protection solution […] more…Breaking The Weakest Link Of The Strongest Chain
Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at the […] more…How One Simple iOS Vulnerability Endangers Over 76 Apps
76 – that’s how many iOS apps out there that are currently laced with a security vulnerability. So, what exactly are these apps vulnerable to, you may ask? To data theft—specifically, silent man-in-the-middle attacks that allow cybercriminals to intercept and steal user data ranging anywhere from valuable healthcare, financial, or personal data. So, where does this massive […] more…Microsoft shelves all February security updates
Microsoft today took the unprecedented step of postponing an entire month’s slate of security updates for Windows and its other products just hours before the patches were to begin rolling out to customers. “We discovered a last-minute issue that could impact some customers and was not resolved in time for our planned updates today,” Microsoft […] more…iOS Users Aren’t So Immune to Threats After All
10 years ago, Fergie and Gwen Stefani were at the top of the charts, and Juno had just been released. While we relaxed in velour tracksuits and shred on Rock Band’s faux guitar, we were also obsessing over the release of what was about to be the biggest game changer to the world of […] more…The Security Advantage of Dynamic Endpoint
The escalation and sophistication of cyber threats is very real. So are the challenges associated with having too many siloed security tools. Rather than compounding complexity and inefficiency by using products that don’t work in unison or communicate with each other, Intel Security made a fundamental shift in how we engineer solutions, moving from point […] more…Lurk: Retracing the Group’s Five-Year Campaign
by Fyodor Yarochkin and Vladimir Kropotov (Senior Threat Researchers) Fileless infections are exactly what their namesake says: they’re infections that don’t involve malicious files being downloaded or written to the system’s disk. While fileless infections are not necessarily new or rare, it presents a serious threat to enterprises and end users given its capability to […] more…Using DNS to weaken Locky, the powerful ransomware threat
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Ransomware and other cyberthreats often go unseen by traditional detection methods like antivirus, deep packet inspection (DPI) or sandboxing. In fact, a report by Lastline Labs indicates that 51% of zero-day malware—threats that […] more…How Much Control Do You Really Have Over Your Family’s Connected Life?
If you took an inventory of your family’s connected devices, would you have three or four devices, or would it be more like 30? You might be surprised how connected your family has become. The gradual, gadget creep is real, as are the security risks that come with it. While the smart products we purchase — […] more…How vulnerable are you behind the wheel of your connected car?
Remember when all you had to worry about with your car is getting an oil change every 3,000 miles. Today’s connected cars are miles ahead technologically speaking of those “dumb” vehicles, but drivers could see a bumpy ride if thieves get a hold of the data the car possesses. The Internet of Things (IoT) has […] more…STAR- A Window to the Cloud
We are all going to live in the cloud. Well that is what every study, and forecast tells us. From our clash of clans villages, to our connected cars we can expect all of our data to be hosted in an unmarked data center in a town that we have never heard of. Perhaps this […] more…Do web injections exist for Android?
Web injection attacks There’s an entire class of attacks that targets browsers – so-called Man-in-the-Browser (MITB) attacks. These attacks can be implemented using various means, including malicious DLLs, rogue extensions, or more complicated malicious code injected into pages in the browser by spoofing proxy servers or other ways. The purpose of an MITB attack may […] more…The Most Important Mobile Security Resolutions for 2017
January gets a bad rap. A dreary month, the air is bitterly cold, and the days are so short that you could miss the daylight in the blink of an eye. At the same time, we try to stay positive and stick to our resolutions for the new year. The common promises to eat better, […] more…More information
- Gillian McKeith’s website seems to love spam
- PayPal exec’s crazy edible password alternative
- Twitch Turns 10, and the Creator Economy Is in Its Debt
- Samsung claims sleek new laptops are lightest on market, at just 1.8lbs
- Google Researchers Detail Critical iMessage Vulnerability
- Safari test points to a future with tracker-free ads
- Living Off Hackathons: The Possible Rise Of The Pro-Hacker
- A Closer Look at ANDROIDOS_TIGERBOT.EVL
- Microsoft Internet Explorer Scripting Engine CVE-2018-8643 Memory Corruption Vulnerability
- Microsoft Disrupts Infrastructure Used by Russia’s Hackers in Ukraine Attacks