Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers

The idea of crowdfunding to raise enough money to buy NSA-linked hacking tools from the Shadow Brokers is picking up steam and making some people steam. The price tag for getting hold of stolen Equation Group hacking tools is 100 Zcash. When I started the article about the Shadow Brokers revealing details about its June Read more about Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers[…]

Share

IDG Contributor Network: Nothing new to (Wanna)Cry about

The WannaCry outbreak has been troubling in many regards – exposing flaws, and opening doors to much finger-pointing and blaming that have gone well beyond the handling and disclosure of nation-state cyber weapon stockpiling. The attackers likely had a good idea of how quickly and widely the attack would spread, evidenced by the fact that Read more about IDG Contributor Network: Nothing new to (Wanna)Cry about[…]

Share

Area 1 Security stops phishing campaigns before they become attacks

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe. Anyone who has spent any amount of time trying to secure their organization’s endpoints or network would not be surprised to learn that phishing is now the #1 delivery vehicle for malware and ransomware. According to Mandiant, phishing was used Read more about Area 1 Security stops phishing campaigns before they become attacks[…]

Share

Top 5 misconceptions of IoT network and device security

Security in multiples Image by Shutterstock The Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet infrastructure, providing greater insight and control over elements in our increasingly connected lives. With an estimated 30 billion connected devices to be deployed across the globe by 2020, Read more about Top 5 misconceptions of IoT network and device security[…]

Share

IDG Contributor Network: Network analysis can find malware before it strikes

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain in an article on the school’s website. The researchers, who have been studying historic network Read more about IDG Contributor Network: Network analysis can find malware before it strikes[…]

Share

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it’s pretty much certain that it’s being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits. The root cause of this Read more about Gravityscan, keeping WordPress sites safe[…]

Share

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles. The attack Read more about Hackers can use malicious subtitles to remotely take control of your device[…]

Share

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value Read more about IDG Contributor Network: PureSec picks up investment because serverless is exciting[…]

Share

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches. This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London.  IoT Threat Defense combines Read more about Cisco: Secure IoT networks, not the devices[…]

Share

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and Read more about IDG Contributor Network: Do you know where your data is?[…]

Share

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, Read more about IDG Contributor Network: Educating the public about security – are we doing it all wrong?[…]

Share

Hackers easily trick iris scanner to unlock Samsung Galaxy S8

When it comes to security and the iris recognition technology used in its flagship Galaxy S8 smartphone, Samsung touted, “The patterns in your irises are unique to you and are virtually impossible to replicate, meaning iris authentication is one of the safest ways to keep your phone locked and the contents private.” But the Chaos Read more about Hackers easily trick iris scanner to unlock Samsung Galaxy S8[…]

Share

Netgear added data collection 'feature' to NightHawk R7000 routers; disable it

Netgear makes some popular routers, but do you really want the company behind your model of router to collect data such as your IP address and MAC address? If the answer is no, then you need to disable the ‘analytics’ data collection. Netgear’s NightHawk R7000 router, dubbed as “best-selling” and “top-rated” router on Amazon, is Read more about Netgear added data collection 'feature' to NightHawk R7000 routers; disable it[…]

Share

Splunk on SOAPA (part 1)

I’ve written a lot about ESG’s security operations and analytics platform architecture (SOAPA).  SOAPA is happening because enterprise organizations are surrounding SIEM with lots of other security analytics and operations tools to accelerate incident detection and response.  As this occurs, many organizations are actively integrating these technologies together with the goal of building an end-to-end, Read more about Splunk on SOAPA (part 1)[…]

Share
Share