4 information security threats that will dominate 2017

As with previous years, 2016 saw no shortage of data breaches. Looking ahead to 2017, the Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. “2016 certainly lived up to expectations,” says Steve Durbin, Read more about 4 information security threats that will dominate 2017[…]

Share

The US has sanctioned Russia over election hacking

The U.S. government has sanctioned Russia’s main two intelligence agencies, four military intelligence officers and is kicking out 35 Russian diplomats over what it says was aggressive harassment of U.S. officials and cyber operations around the 2016 presidential election. The move follows up on a pledge made by President Obama to retaliate against Russia for Read more about The US has sanctioned Russia over election hacking[…]

Share

New year's resolution for IoT vendors: Start treating LANs as hostile

In November, researchers from cybersecurity firm Invincea reported a vulnerability that could have allowed hackers to infect Belkin WeMo smart plugs with malware. The flaw was located in a configuration protocol that worked over the local area network and didn’t require any authentication. In 2015, when researchers from vulnerability intelligence firm Rapid7 analyzed nine Internet-connected Read more about New year's resolution for IoT vendors: Start treating LANs as hostile[…]

Share

5 signs we're finally getting our act together on security

The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next. For example, ransomware has surged in the last year. Although that Read more about 5 signs we're finally getting our act together on security[…]

Share

Critical flaw in PHPMailer library puts millions of websites at risk

A critical remote code execution vulnerability in PHPMailer, one of the most widely used PHP email sending libraries, could put millions of websites at risk of hacking. The flaw was found by a security researcher named Dawid Golunski and an initial fix was included in PHPMailer 5.2.18, which was released Saturday. However, it turns out Read more about Critical flaw in PHPMailer library puts millions of websites at risk[…]

Share

Thwarting cybersecurity threats with behavioral analytics in 2017

Companies are investing more money in emerging technologies that can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats, both of which are weighing heavily on the minds’ of corporate board members. For 2017 CIOs are eyeing tools that use anomaly-detecting analytics and machine learning algorithms to protect their Read more about Thwarting cybersecurity threats with behavioral analytics in 2017[…]

Share

Encryption in 2016: Small victories add up

Technology development seems to gallop a little faster each year. But there’s always one laggard: encryption. Why the deliberate pace? Because a single, small mistake can cut off communications or shut down businesses. Yet there are times when you take stock—only to discover the encryption landscape seems to have transformed overnight. Now is that time. Read more about Encryption in 2016: Small victories add up[…]

Share

Ransomworm: the next level of cybersecurity nastiness

As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse. Scott Millis, CTO at mobile security company Cyber adAPT, expects ransomware to spin out of control in the year ahead. That is an astounding statement when you consider that there Read more about Ransomworm: the next level of cybersecurity nastiness[…]

Share

Using big data for security only provides insight, not protection

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Cybersecurity experts are excited about big data because it is the “crime scene investigator” of data science. If your organization is hacked and customer information compromised, your use of big data to collect Read more about Using big data for security only provides insight, not protection[…]

Share

New products of the week 12.26.16

New products of the week Image by Dabkicks Our roundup of intriguing new products. Read how to submit an entry to Network World’s products of the week slideshow. Cumulus Linux 3.2 Image by Cumulus Networks To read this article in full or to leave a comment, please click here Source: NW Security 1

Share

Corporate boards aren't prepared for cyberattacks

Major cyberattacks against organizations of all sizes seem to happen almost weekly. On Dec. 14, Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts. Despite the scale and potential harm from such attacks, there’s wide recognition that corporate leaders, especially boards of directors, aren’t taking the necessary actions to defend their Read more about Corporate boards aren't prepared for cyberattacks[…]

Share

What fake news means for IT—and how IT security can help fight it

When the story broke a week before the election about Macedonian teenagers creating fake pro-Trump news stories in order to harvest ad clicks, it triggered a serious feeling of déjà vu among those who work in cybersecurity. Scrappy bands of shady Eastern Europeans entrepreneurs taking advantages of weaknesses in our tech infrastructure to make a Read more about What fake news means for IT—and how IT security can help fight it[…]

Share

Apple gives iOS app developers more time to encrypt communications

Apple has backtracked on a plan to force iOS developers to encrypt their app communications by the end of the year. The company had previously announced at its Worldwide Developers’ Conference in June that all apps submitted to the App Store will need support the App Transport Security (ATS) feature starting January 1st, 2017. It Read more about Apple gives iOS app developers more time to encrypt communications[…]

Share

US collects social media handles from select visitors

Visitors to the U.S. under a visa waiver program are being asked by the Department of Homeland Security for information on their social media accounts, a plan that had drawn criticism from civil rights groups for its potential encroachment on privacy. The U.S. Customs and Border Protection unit of the DHS asked for written comments Read more about US collects social media handles from select visitors[…]

Share

Black market medical record prices drop to under $10, criminals switch to ransomware

The black market value of stolen medical records dropped dramatically this year, and criminals shifted their efforts from stealing data to spreading ransom ware, according to a report released this morning. Hackers are now offering stolen records at between $1.50 and $10 each, said Anthony James, CMO at San Mateo, Calif.-based security firm TrapX, the Read more about Black market medical record prices drop to under $10, criminals switch to ransomware[…]

Share
Share