What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
NetworkWorld.webp 2017-03-06 09:03:00 Should police departments be able to have their own DNA databases? (lien direct) DNA is supposed to be the answer for solving cold cases. For example, Wisconsin police have turned to DNA to help solve a 42-year-old cold case of “Baby Sarah.” Recently in Niagara Falls, cops found the man responsible for a smash and grab robbery committed 11 years ago, in 2006, via DNA which the man had been ordered to submit for unrelated offences. But it takes some state labs a year-and-a-half to process DNA, so some police departments are bypassing the state labs and creating their own DNA databases to track criminals.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-06 06:39:00 US DOJ drops child porn case to avoid disclosing Tor exploit (lien direct) The U.S. Department of Justice is asking a federal court to dismiss its indictment in a case that involves a child porn site known as Playpen after a judge asked the government to disclose the hacking technique it used to gather evidence."The government must now choose between disclosure of classified information and dismissal of its indictment," the DOJ said in a court filing Friday. "Disclosure is not currently an option."The case involves Jay Michaud, a school administrator from Vancouver, Washington, who was arrested in July 2015 for allegedly viewing child porn images on Playpen. Michaud's case was one of at least 137 cases brought throughout the U.S. in relation to Playpen, a website that operated on the Tor anonymity network and which the FBI managed to seize in 2015.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-06 06:00:01 Okta acquires Stormpath to boost its identity services for developers (lien direct) Okta has acquired Stormpath, a company that provides authentication services for developers. The deal should help the identity provider improve its developer-facing capabilities.Stormpath offered developers a set of tools for managing user logins for their apps. Rather than building a login system from scratch, developers could call the Stormpath API and have the company take care of it for them. Frederic Kerrest, Okta's co-founder and Chief Operating Officer, said that the acquisition should help his company build self-service capabilities for developers.While Okta is probably best known for its identity and access management products aimed at businesses' internal use, the company also operates a developer platform aimed at helping app developers handle user identity. Kerrest said that the developer capabilities are a fast-growing part of Okta's business, but that its functionality could use some help. That's where this acquisition comes in.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-06 02:58:00 (Déjà vu) New products of the week 3.6.17 (lien direct) New products of the weekNew products of the weekImage by CertaOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.A10 Networks Thunder CFW, with integrated Gi/SGi firewall capabilitiesa10Image by a10To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-06 02:50:00 Review: vArmour flips security on its head (lien direct) Almost every cybersecurity program these days does some sort of scanning, sandboxing or traffic examination to look for anomalies that might indicate the presence of malware. We've even reviewed dedicated threat-hunting tools that ferret out malware that's already active inside a network. However, what if there were a different way to approach security? Instead of searching for behaviors that might indicate a threat, what if you could define everything that is allowed within a network? If every process, application and workflow needed to conduct business could be defined, then by default everything outside of those definitions could be flagged as illegal. At the very least, critical programs could be identified and all interactions with them could be tightly defined and monitored. It's a different way of looking at security, called segmentation.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-05 07:31:00 Ransomware attack hit Pennsylvania Democratic Senators (lien direct) The Pennsylvania Senate Democratic Caucus was hit with a ransomware attack, locking 16 Democratic senators and their staff out of their computer network.The attack was discovered on Friday morning; at the time of publishing on Sunday, the site was still down and displayed an “error establishing a database connection” message. The same error displays when trying to view each Democratic senator's website.“Officials from the caucus have been in contact with law enforcement to investigate the incident and are working with Microsoft to restore the IT system,” according to a written statement text-messaged to reporters and obtained by The Hill. It was sent via text since the caucus could not use its email. “There is currently no indication that the caucus system was targeted or that any data has been compromised.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-04 13:07:00 Enough with "the Cyber"! (lien direct) Email is great; it's transformed business, enabled geographically dispersed families and friends to stay in touch, redefined news distribution, transformed sales pipelines … the list of good stuff about email is endless. But, as many people have discovered to their cost, keeping control of your email account requires effort, effort like not using dumb, easy-to-guess passwords, and making sure your email hosting service is reliable and not, for example, Yahoo or AOL. And these issues aren't anything like new, recent discoveries; we've all known for over a decade where the risks lie … well, all of us except, apparently, for the government.I don't know about you, but  during the 2016 election I was fairly surprised when the Democratic National Committee email system was hacked after which the email account of John Podesta, the DNC chairperson, was hacked. You'd have thought that the folks who manage IT for these people would have known the risks and done more to minimize exposure but when simple phishing and malware intrusions that should never of happened and which went undetected were successful, then you have to wonder where the disconnect lies.To read this article in full or to leave a comment, please click here Yahoo
NetworkWorld.webp 2017-03-03 12:28:31 HackerOne offers bug bounty service for free to open-source projects (lien direct) HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free."Here at HackerOne, open source runs through our veins," the company's representatives said in a blog post. "Our company, product, and approach is built on, inspired by, and driven by open source and a culture of collaborative software development. As such, we want to give something back."HackerOne is a platform that makes it easier for companies to interact with security researchers, triage their reports, and reward them. Very few companies have the necessary resources to build and maintain bug bounty programs on their own with all the logistics that such efforts involve, much less so open-source projects that are mostly funded through donations.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-03 11:01:00 Security alert overload threatens to bury security teams (lien direct) When it comes to incident detection and response, enterprise organizations are collecting, processing and analyzing more security data through an assortment of new analytics tools-endpoint detection and response (EDR) tools, network analytics tools, threat intelligence platforms (TIPs), etc.When each of threat management or security analytics tools sees something suspicious, it generates a security alert, and therein lies the problem: Enterprise organizations are getting buried by an avalanche of security alerts. According to ESG research: When asked to identify their top incident response challenges, 36 percent of the cybersecurity professionals surveyed said, “keeping up with the volume of security alerts.” Forty-two percent of cybersecurity professionals say their organization ignores a significant number of security alerts because they can't keep up with the volume.  When asked to estimate the percentage of security alerts ignored at their organization, 34 percent say between 26 percent and 50 percent, 20 percent of cybersecurity professionals say their organization ignores between 50 percent and 75 percent of security alerts, and 11 percent say their organization ignores more than 75 percent of security alerts. Mama Mia, that's a lot of security alerts left on the cutting room floor.  All told, the ESG data indicates that cybersecurity professionals are struggling to keep up with security alert volume and are doing their best to identify, prioritize and address the most critical of the lot. This makes it fairly easy for cyber adversaries to hide stealthy attacks, circumvent security controls and fly under the radar through a pervasive security alert storm.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-03 09:15:00 The 10 essential Reddits for security pros (lien direct) Going viral1 reddit introImage by IDGReddit isn't just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between - if you know where to look.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-03 09:05:00 U.S. Marshals warn against dual phone scams (lien direct) The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country.The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines.+More on Network World: Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier's check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-03 09:01:07 Fileless Powershell malware uses DNS as covert communication channel (lien direct) Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-03 05:13:00 Infosec mourns over Howard Schmidt, who helped make the country a safer place (lien direct) Howard Schmidt advised both President Brack Obama and George W. Bush on cybersecurity. He was a CSO at Microsoft and a CISO at eBay. He led several industry groups, and wrote books on cybersecurity.But when security professionals remember him, it is not so much for his technical accomplishments as for the impact he had on the people around him. He is remembered as a mentor, a communicator, and an educator."He does have a very storied path of accomplishment," said Mary Ann Davidson, CSO at Redwood City, Calif.-based Oracle Corp. "From a security standpoint, he had a tremendous impact, the many roles he played, the work in the white house."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 20:50:00 Pence used private mail for state work as governor, account was hacked (lien direct) U.S. Vice President Mike Pence reportedly used a private email account to transact state business when he was governor of Indiana, and his AOL account was hacked once, according to a news report. Emails released to the Indianapolis Star following a public records request are said to show that Pence used his personal AOL account to communicate with his top advisers on issues ranging from security gates at the governor's residence to the state's response to terror attacks across the globe. A hacker seems to have got access to his email account in June last year and sent a fake mail to people on the former governor's contact list, claiming  that Pence and his wife had been attacked on their way back to their hotel in the Philippines, according to the report. Pence subsequently changed his AOL account.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 12:07:52 Slack bug paved the way for a hack that can steal user access (lien direct) One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick users into handing over access to their accounts.Bug bounty hunter Frans Rosen noticed he could steal Slack access tokens to user accounts due to a flaw in the way the application communicates data in an internet browser.“Slack missed an important step when using a technology called postMessage,” Rosen said on Wednesday in an email.  PostMessage is a kind of command that can let separate browser windows communicate with each other. In Slack, it's used whenever the chat application opens a new window to enable a voice call.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 11:50:53 Free decryption tools now available for Dharma ransomware (lien direct) Computer users who have been affected by the Dharma ransomware and have held onto their encrypted files can now restore them for free. Researchers have created decryption tools for this ransomware strain after someone recently leaked the decryption keys.Dharma first appeared in November and is based on an older ransomware program known as Crysis. It's easy to recognize files affected by it because they will have the extension: .[email_address].dharma, where the email address is the one used by the attacker as a point of contact.On Wednesday, a user named gektar published a link to a Pastebin post on the BleepingComputer.com technical support forum. The post, he claimed, contained the decryption keys for all Dharma variants.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 09:51:00 Ransomware roundtable: Is this the new spam? (lien direct) Matt Gangwer, CTO of Rook Security and Ryan O'Leary, VP of Threat Research Center and Tech Support at WhiteHat Security join CSO Online's Steve Ragan to talk about the evolution of ransomware, and what companies need to do to combat it.
NetworkWorld.webp 2017-03-02 07:32:08 Chrome for MacOS to block rogue ad injections and settings changes (lien direct) Google has expanded its Safe Browsing service, allowing Google Chrome on macOS to better protect users from programs that locally inject ads into web pages or that change the browser's home page and search settings.The Safe Browsing service is used by Google's search engine, as well as Google Chrome and Mozilla Firefox, to block users from accessing websites that host malicious code or malicious software. The service is also used in Chrome to scan downloaded files and block users from executing those that are flagged as malicious."Safe Browsing is broadening its protection of macOS devices, enabling safer browsing experiences by improving defenses against unwanted software and malware targeting macOS," Google said in a blog post Wednesday. "As a result, macOS users may start seeing more warnings when they navigate to dangerous sites or download dangerous files."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 05:40:00 How to get your infrastructure in shape to shake off scriptable attacks (lien direct) According to F-Secure's The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks.The number of attack scripts is climbing as elite hackers continue to create these scripts and sell them to others, says Itzik Kotler, CTO and Co-Founder, SafeBreach. There doesn't seem to be any stopping this trend.CSO examines scriptable attacks and the part of the problem that you can control: getting your infrastructure in shape to shrug off these breaches.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-02 05:38:00 How to respond to a cyber attack (lien direct) Preparing and responding to a cyberattackcyberattackImage by ThinkstockCybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there's also the danger of damaging an innocent victim's system.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 20:36:46 US FCC stays data security regulations for broadband providers (lien direct) The U.S. Federal Communications Commission has halted new rules that would require high-speed internet providers to take 'reasonable' steps to protect customer data.In a 2-1 vote that went along party lines, the FCC voted Wednesday to stay temporarily one part of privacy rules passed in October that would give consumers the right to decide how their data is used and shared by broadband providers.The rules include the requirement that internet service providers should obtain "opt-in" consent from consumers to use and share sensitive information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 17:01:38 Yahoo execs botched its response to 2014 breach, investigation finds (lien direct) If your company has experienced a data breach, it's probably a good idea to thoroughly investigate it promptly.Unfortunately, Yahoo didn't, according to a new internal investigation. The internet pioneer, which reported a massive data breach involving 500 million user accounts in September, actually knew an intrusion had occurred back in 2014, but allegedly botched its response.The findings were made in a Yahoo securities exchange filing on Wednesday that offered more details about the 2014 breach, which the company has blamed on a state-sponsored hacker.To read this article in full or to leave a comment, please click here Yahoo
NetworkWorld.webp 2017-03-01 13:59:37 Old Windows malware may have tampered with 132 Android apps (lien direct) More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers.The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks.Google has already removed the apps from its Play store. But what's interesting is the developers behind the apps probably aren't to blame for including the malicious code, Palo Alto Networks said in a Wednesday blog post.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 11:48:43 US surveillance law may see no new protections for foreign targets (lien direct) Any reform of a controversial U.S. law allowing the National Security Agency to spy on people overseas will likely focus on its impact on U.S. residents, without curbing its use elsewhere.Section 702 of the Foreign Intelligence Surveillance Act expires on Dec. 31, and some digital rights groups are calling on Congress to overhaul the law to protect the privacy of residents of both the U.S. and other countries. Congress will almost certainly extend the provision in some form. But a congressional hearing on Wednesday focused largely on the NSA's "inadvertent" collection of U.S. residents' data, with little time given to the privacy concerns of people overseas.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 09:24:00 February 2017: The month in hacks and breaches (lien direct) On February 5, an anonymous hacker kicked off February's breaches, taking down a dark web hosting service that the hacker claimed was hosting child pornography sites. In the process, the hacker showed just how easily the dark web can be compromised.Then, on February 10, as many as 20 hackers (or groups of hackers) exploited a recently patched REST API vulnerability to deface over 1.5 million web pages across about 40,000 WordPress websites. “The flaw was fixed in WordPress 4.7.2, released on Jan. 26, but the WordPress team did not publicly disclose the vulnerability's existence until a week later,” Lucian Constantin reported.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 08:53:00 Cisco warns of NetFlow appliance vulnerability (lien direct) Cisco today issued a security warning about a potential vulnerability in its NetFlow traffic monitoring device that could cause the system to lock-up. +More on Network World: Cisco tries to squash Smart Install security abuse+ Specifically, Cisco wrote: “A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 08:52:00 IDG Contributor Network: SD-WAN facilitates security on the WAN (lien direct) With RSA San Francisco-one of, if not the biggest security show of the year-behind us, it's a good time to revisit security and SD-WANs. I know, we already lived through Yoda's prognostications about the future of networking and security. In that blog post, we spoke about vendor approaches to securing the new Internet connections created by SD-WAN. There's another dimension, though, to SD-WAN security that we didn't discuss and that's about the WAN.The WAN: Risk and reward for today's attackers For a lot of SD-WAN vendors, security integration means inspecting incoming and outgoing Internet traffic. But while services, such as Zscaler, may inspect HTTP traffic bound for the internet, they do nothing for traffic bound to other locations. And that's a problem because increasingly site-to-site traffic requires its own inspection and protection.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 08:28:00 IDG Contributor Network: To improve information security, enterprises and government must share information (lien direct) Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.The reality is providing protection in this kind of environment is so challenging that no single entity, whether it's a company or a government agency, can accomplish this task alone. There needs to be some kind of cooperation between the private and public sectors. This leads to the questions of what kind of relationship should the government and companies have, how can they work together and what's preventing this process from happening?To read this article in full or to leave a comment, please click here Guideline Yahoo
NetworkWorld.webp 2017-03-01 08:23:00 IT experience can be beneficial for a cybersecurity career (lien direct) Given my interest in cybersecurity skills and training, I'm contacted by academic institutions, professional organizations and training companies with news about some type of cybersecurity education curriculum. This isn't surprising given the global shortage of cybersecurity skills. In fact, new ESG research discloses that 45% of organizations report a “problematic shortage” of cybersecurity skills in 2017.Clearly we need more smart and well-prepared people to enter the cybersecurity ranks, but it's important to note that most cybersecurity professionals don't enter the workforce directly from college or training programs. According to research conducted in 2016 by ESG and the Information Systems Security Association (ISSA), 78% of cybersecurity professionals follow a more indirect route. These folks start their careers as IT professionals and make their way into cybersecurity as their careers progress.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 08:22:00 Palo Alto Networks pays $105M for LightCyber to better detect network attacks (lien direct) Palo Alto Networks has bought LightCyber for its behavioral analytics platform that can speed the time to detect intrusions that have already breached networks and are looking around for ways to carry out exploits.The $105 million cash deal brings LightCyber's ability to analyze behavior of devices to discover reconnaissance by malware inside networks and lateral movements as it seeks to compromise vulnerable systems.Based on machine learning, LightCyber absorbs the behaviors of individuals and devices, sets a normal level for them and finds anomalies that could indicate attacks underway.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 08:09:51 Robots are just as plagued by security vulnerabilities as IoT devices (lien direct) An analysis of robots used in homes, businesses and industrial installations has revealed many of the same basic weaknesses that are common in IoT devices, raising questions about security implications for human safety.The robotics industry has already seen significant growth in recent years and will only further accelerate. Robots are  expected to serve in many roles, from assisting people in homes, stores and medical facilities, to manufacturing things in factories and even handling security and law enforcement tasks."When you think of robots as computers with arms, legs, or wheels, they become kinetic IoT devices that, if hacked, can pose new serious threats we have never encountered before," researchers from cybersecurity consultancy firm IOActive said in a new report.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-01 05:20:00 Global cybercrime prosecution a patchwork of alliances (lien direct) We don't hear much about John Dillinger-style bank robberies these days, with exciting police chases to the state lines. In 2015, there were 4,091 traditional bank robberies in the US, according to the FBI, with an average loss of less than $4,000 per incident. No customers or bank employees were killed in any of these robberies, though eight would-be robbers were killed.The clearance rate for traditional bank robberies is around 60 percent, while the proportion of criminals that escape could be even lower, if they commit more than one robbery -- the FBI currently has fewer than 500 people on its list of wanted and unidentified bank robbers. In most cases, the FBI has a picture of them, and a description, posted on its website.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 19:06:26 Smart teddy bear maker faces scrutiny over data breach response (lien direct) Did a toymaker ignore warnings about a data breach? That's a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.On Tuesday, Spiral Toys said the breach, which affects 800,000 user accounts, only came to its attention last week on Feb. 22.The statement is raising eyebrows. One researcher named Victor Gevers began contacting the toymaker about the problem in late December, when he noticed that a company MongoDB database storing customer information was publicly exposed.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 14:30:00 Microsoft may owe you $100 if you bought from the Microsoft Store (lien direct) Microsoft has settled a class-action lawsuit regarding sales at its Microsoft Store outlets. And if you made a purchase at one of those stores, you might be owed as much as $100.The lawsuit alleged that Microsoft Store receipts contained too much information. The lead plaintiff's receipt listed the buyer's name, the name of the salesperson and the first six and last four digits of the buyer's payment card number-more than half the numbers on the card. According to the 2003 U.S. Fair and Accurate Credit Transactions Act (FACTA), retailers may print only the last five numbers of a payment card on the receipt. Retailers had until 2006 to comply with this restriction, and the Microsoft Stores are much newer than that. To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-02-28 13:36:00 Google reveals Microsoft bug affecting IE and Edge (lien direct) Google is pretty strict about its Project Zero rules when it comes to disclosure: a company has 90 days to fix the bug after it is informed by Google, after which it is announced to the public. Google did it last week with the announcement of two unpatched bugs, and now it's doing it again. A security flaw in Microsoft Edge and Internet Explorer was first reported to Microsoft Nov. 25, 2016. Microsoft was offered the standard 90-day lead to patch the issue before Google announced it to the world. With the cancellation of this month's Patch Tuesday, Microsoft failed to issue a fix, and now the bug is out there for the whole world to see. To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-02-28 10:42:00 Border agents go all Monty Python on visa-holding software engineer (lien direct) There have been more egregious episodes of U.S. border agents hassling and/or needlessly detaining citizens and valid visa-holders since the White House changed hands, but perhaps none has been more bizarre – or even darkly comical – than this one. Celestine Omin, a 28-year-old software engineer from Lagos, Nigeria, was traveling to the U.S. on Sunday as part of his job with Andela, a startup backed by Facebook's Mark Zuckerberg and Priscilla Chan. Upon arrival at JFK Airport, he was questioned by one border agent, waited for an hour, and then was brought to a different room to be questioned by a second agent. From a LinkedIn story:To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 09:45:00 A new way to prevent cyberattacks on home devices (lien direct) BARCELONA -- Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo.The device was shown at Mobile World Congress here this week and will go on sale online in April. While the Dojo device isn't intended to provide enterprise-level security, it could be used to help, in a small way, in warding off massive attacks like the one that used the Mirai botnet which took advantage of unsecure, consumer-grade cameras and other devices last October.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 09:35:00 Cisco tries to squash Smart Install security abuse (lien direct) Cisco is playing down a security issue with its Smart Install switch management software that could allow unauthenticated access to customer configuration details.Cisco defines Smart Install as a legacy feature that provides zero-touch deployment for new switches, typically access layer switches.+More on Network World: Cisco Jasper grows Internet of Things reach, breadth+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 09:31:00 Trend Micro report: Ransomware booming (lien direct) The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data collected from customers.Not only is the ransomware business booming, it's innovating, with Trend Micro researchers identifying 752 new families last year, up from 29 in 2015.Add to this the rise of ransomware as a service (RaaS) and payments made to anonymous bitcoin accounts, and the result is a booming criminal enterprise worth $1 billion last year, according to TrendLabs 2016 Security Roundup. Neophyte crooks are being drawn in because it's so easy to set up a ransomware operation, the report says. “Since RaaS is available in the underground, the service provides fledgling cybercriminals the necessary tools to run their own extortion campaigns,” it says.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 08:49:29 This tool can help you discover Cisco Smart Install protocol abuse (lien direct) For the past few weeks attackers have been probing networks for switches that can potentially be hijacked using the Cisco Smart Install (SMI) protocol. Researchers from Cisco's Talos team have now released a tool that allows network owners to discover devices that might be vulnerable to such attacks.The Cisco SMI protocol is used for so-called zero-touch deployment of new devices, primarily access layer switches running Cisco IOS or IOS XE software. The protocol allows newly installed switches to automatically download their configuration via SMI from an existing switch or router configured as an integrated branch director (IBD).The director can copy the client's startup-config file or replace it with a custom one, can load a particular IOS image on the client and can execute high-privilege configuration mode commands on it. Because the SMI protocol does not support any authorization or authentication mechanism by default, attackers can potentially hijack SMI-enabled devices.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 07:22:00 821,000 user records exposed due to misconfigured MongoDB for smart stuffed toys (lien direct) No one wants to learn that they have been hacked; if a company is not doing so well, then it might really be scared after it is breached. But burying your head in sand and hoping it will all go away if you ignore it for long enough is simply not going to make the breach disappear. In the case of CloudPets, owned by SpiralToys, it wasn't the cute and huggable smart stuffed toys hackers were hugging, but the data. Here it is:- Toy captured kids voices- Data exposed via MongoDB- 2.2m recordings- DB ransom'd- And much more...https://t.co/HvePnZleXRTo read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 05:01:00 New financial regulations go into effect in New York (lien direct) On March 1, new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the cybersecurity policies of their business partners.It might seem a little sudden, since the regulations were only finalized a month ago. But it's actually not as bad as it sounds."There's a transitional period," said Brad Keller, senior director of third party strategy at Prevalent. "Everyone has six months to be in compliance."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 05:00:00 Will a cyber crisis add to chaos of Trump\'s first 100 days? (lien direct) While plenty of controversy has surrounded President Donald Trump's fledgling administration, it hasn't yet faced a major crisis.But according to Forrester Research, aside from any political or military events, the new president will face a cyber crisis sometime within his first 100 days.The company made the prediction last fall, prior to the election, as part of its “Predictions 2017” brief, so it didn't specifically focus on either Trump or Democratic candidate Hillary Clinton.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 04:58:00 7 universal rules of threat intelligence (lien direct) Threatening1 threateningImage by ThinkstockCybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization's cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-28 01:10:48 This tiny chip could revolutionize smartphone and IOT security (lien direct) Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices.The chip is just 5 millimeters square -- smaller than a fingernail -- and is capable of generating mathematically provable random numbers. Such numbers are the basis for highly-secure encryption systems and producing them in such a small package hasn't been possible until now.The chip, on show at this week's Mobile World Congress in Barcelona, could be in sample production as early as March this year and will cost a few dollars once in commercial production, said Sean Kwak, director at SK Telecom's quantum technology lab.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-27 18:08:59 Smart teddy bears involved in a contentious data breach (lien direct) If you own a stuffed animal from CloudPets, then you better change your password to the product. The toys -- which can receive and send voice messages from children and parents -- have been involved in a data breach dealing with more than 800,000 user accounts.The breach, which grabbed headlines on Monday, is drawing concerns from security researchers because it may have given hackers access to voice recordings from the toy's customers. But the company behind the products, Spiral Toys, is denying that any customers were hacked. "Were voice recordings stolen? Absolutely not," said Mark Myers, CEO of the company.Security researcher Troy Hunt, who tracks data breaches, brought the incident to light on Monday. Hackers appear to have accessed an exposed CloudPets' database, which contained email addresses and hashed passwords, and they even sought to ransom the information back in January, he said in a blog post.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-27 14:39:00 Space X to zoom two citizen astronauts to the moon (lien direct) Space X today said two unnamed private citizens have paid the company a “significant deposit” to fly them to the moon and back to Earth.“We expect to conduct health and fitness tests, as well as begin initial training later this year. Other flight teams have also expressed strong interest and we expect more to follow. Additional information will be released about the flight teams, contingent upon their approval and confirmation of the health and fitness test results,” Space X stated.Space X said the mission will take place after the space company launches its unmanned Dragon (Version 2) spacecraft to the International Space Station later this year.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-27 13:23:44 Google shifts on email encryption tool, leaving its fate unclear (lien direct) Google is asking developers to take over its effort to make end-to-end email encryption more user-friendly, raising questions over whether it'll ever become an official feature in the company's browser.On Friday, the search giant said its email encryption tool, originally announced in 2014, was no longer a Google product. Instead, it's become a "full community-driven open source project," the company said in a blog post.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-27 10:34:00 The latest ransomware threat: Doxware (lien direct) This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.As if ransomware wasn't bad enough, there is a new twist called doxware.  The term "doxware" is a combination of doxing - posting hacked personal information online - and ransomware. Attackers notify victims that their sensitive, confidential or personal files will be released online. If contact lists are also stolen, the perpetrators may threaten to release information to the lists or send them links to the online content.Doxware and ransomware share some similarities. They both encrypt the victim's files, both include a demand for payment, and both attacks are highly automated. However, in a ransomware attack, files do not have to be removed from the target; encrypting the files is sufficient. A doxware attack is meaningless unless the files are uploaded to the attacker's system. Uploading all of the victim's files is unwieldy, so doxware attacks tend to be more focused, prioritizing files that include trigger words such as confidential, privileged communication, sensitive or private. To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-02-27 10:23:45 SHA-1 collision can break SVN code repositories (lien direct) A recently announced SHA-1 collision attack has the potential to break code repositories that use the Subversion (SVN) revision control system. The first victim was the repository for the WebKit browser engine that was corrupted after someone committed two different PDF files with the same SHA-1 hash to it.The incident happened hours after researchers from Google and Centrum Wiskunde & Informatica (CWI) in the Netherlands announced the first practical collision attack against the SHA-1 hash function on Thursday. Their demonstration consisted of creating two PDF files with different contents that had the same SHA-1 digest.To read this article in full or to leave a comment, please click here
Last update at: 2024-04-29 03:07:31
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter