IBM warns of rising VoIP cyber-attacks

Cyber-attacks using the VoIP protocol Session Initiation Protocol (SIP) have been growing this year accounting for over 51% of the security event activity analyzed in the last 12 months, according to a report from IBM’s Security Intelligence group this week. “SIP is one of the most commonly used application layer protocols in VoIP technology… we[…]


Senators fail to stop new rules allowing US law-enforcement hacking

Three senators’ efforts to stop a major expansion of U.S. law enforcement agencies’ hacking powers has failed for now. Proposed changes to Rule 41, the search-and-seizure provision in the Federal Rules of Criminal Procedure, will go into effect Thursday barring any last-minute action in Congress.  The rules change will give U.S. law enforcement agencies the authority[…]

IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication

SecureAuth is in the business of adaptive access control. What that means in plain (or at least more plain) English is that the company offers security solutions that balance strength with ease of use and that adapt to different use cases. An example of adaptive access control might be requiring a simple username and password[…]

IDG Contributor Network: 8 security tips for retailers and consumers this holiday season

It’s the time of year for holiday cheer. Hot chocolate, cookies, presents and other festivities abound. Shops dress up their windows in exotic displays, and festive lights can be seen everywhere. Yes, it’s the time of year when everything is grander and everyone seems happier. But it’s not always sunshine and roses during the holiday[…]

Study warns of human rights risks from censoring online terror content

Internet companies should not be required to monitor third-party terrorist content that they host or transmit, nor should they face direct or indirect liability from governments for such content, according to a new study. The Global Network Initiative, a group that represents academics, investors, civil society organizations and companies including Facebook, Google and Microsoft, published[…]

Wisconsin recount over suspected hacking will not be by hand

A judge in Wisconsin has refused to order a recount by hand of ballots cast in the state for the U.S. presidential elections, shooting down a petition by Green Party candidate Jill Stein that the use of automatic tabulating equipment, identified as potential targets of foreign government agents, “risks tainting the recount process.” The Wisconsin[…]

The new Mirai strain has gone far beyond Deutsche Telekom

The latest strain of Mirai, the malware that’s been infecting internet routers from Germany’s Deutsche Telekom, has spread to devices in at least 10 other countries, according to security firm Flashpoint. The company has detected the new Mirai strain infecting internet routers and modems across the globe, including in the U.K., Brazil, Iran and Thailand.[…]

Isolation technologies create an “air gap” to eliminate the risk of malware

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Like the threat landscape itself, web gateways have changed over the years. Back in the 1990s, organizations primarily used them to prevent employees from wasting time surfing the web – or worse, from[…]

DARPA building space consortium to set standards for safe robotic maneuvers

DARPA next month will talk about a proposed consortium of industry players that will research, develop, and publish standards for safe commercial robotic servicing operations in Earth’s orbit. Specifically, DARPA said it wants to create the Consortium for Execution of Rendezvous and Servicing Operations or CONFERS that looks to establish a forum that would use[…]

Goodbye SIEM, Hello SOAPA

Security Information and Event Management (SIEM) systems have been around for a dozen years or so.  During that timeframe, SIEMs evolved from perimeter security event correlation tools, to GRC platforms, to security analytics systems.  Early vendors like eSecurity, GuardedNet, Intellitactics, and NetForensics, are distant memories, today’s SIEM market is now dominated by a few leaders:[…]