What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
NetworkWorld.webp 2017-04-03 16:33:01 Banking hackers left a clue that may link them to North Korea (lien direct) The notorious hackers behind a string of banking heists have left behind a clue that supports a long-suspected link to North Korea, according to security researchers.The so-called Lazarus Group has been eyed as a possible culprit behind the heists, which included last February's $81 million theft from Bangladesh's central bank through the SWIFT transaction software.However, hackers working for the group recently made a mistake: They failed to wipe the logs from a server the group had hacked in Europe, security firm Kaspersky Lab said on Monday.To read this article in full or to leave a comment, please click here Medical APT 38
NetworkWorld.webp 2017-04-03 13:18:00 SaferVPN says it takes the risk out of using public Wi-Fi connections   (lien direct) This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Bring-your-own-device (BYOD) has become a fairly standard practice in most businesses today. Who among us hasn't pulled out their cell phone to do a quick check of company email while killing time in a restaurant or a checkout line? The prevalence of public Wi-Fi makes it so easy to connect and tend to a little business while on the go.Many people look at public Wi-Fi as a convenience, or even as a requirement, when choosing where to spend time and money. Look in the window of any coffee shop today and count how many people are engaged with a laptop, tablet or mobile phone. How many of them would still be there if the shop didn't provide free Wi-Fi?To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 12:42:00 March 2017: The month in hacks and breaches (lien direct) March came in like a lion with news breaking on March 6 that spamming operation River City Media exposed 1.34 billion email accounts, some of which included personal information including full names and addresses. How did this happen? The company failed to properly configure their Rsync backups, wrote CSO's Steve Ragan.Later that week, WikiLeaks released a trove of information on the CIA's hacking tools, including descriptions of how the agency targeted iPhones, Android phones, Samsung smart TVs, and routers.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 12:27:00 Beyond Trust: privilege, vulnerability management available through Azure (lien direct) Users of Azure cloud services have a new option for stopping the misuse of privileges as well as managing vulnerabilities through an alliance with Beyond Trust.Azure customers who buy Beyond Trust licenses can host PowerBroker, the company's privileged access management (PAM) and its vulnerability management (VM) platform, Retina, in their Azure cloud instances.They can host BeyondSaaS perimeter vulnerability scanning in Azure as well. Both are available via the Azure Marketplace.These new services give Beyond Trust customers a third option for how they deploy PAM and VM. Before they could extend a local instance of Beyond Trust's security to the Azure cloud via software connectors or deploy it within the cloud using software agents deployed on virtual machines there.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 11:19:57 UEFI flaws can be exploited to install highly persistent ransomware (lien direct) Over the past few years, the world has seen ransomware threats advance from living inside browsers to operating systems, to the bootloader, and now to the low-level firmware that powers a computer's hardware components.Earlier this year, a team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.On Friday, at the Black Hat Asia security conference, the team revealed how they did it: by exploiting vulnerabilities in the firmware of two models of ultra compact PCs from Taiwanese computer manufacturer Gigabyte Technology.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 09:44:00 Micro-segmentation projects span enterprise organizations (lien direct) Micro-segmentation is nothing new. We starting talking about the concept a few years ago with the onset of software-defined networking (SDN) technologies such as OpenFlow. More recently, micro-segmentation was most often associated with establishing trusted connections between cloud-based workloads.Micro-segmentation is simply a new software-based spin on the old practice of network segmentation that organizations have done for years with a variety of technologies-firewalls, VLANs, subnets, switch-based access control lists (ACLs), etc. In fact, many organizations use a potpourri of some or even all of these technologies. According to ESG research:To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 07:15:00 Android now the world\'s most popular operating system (lien direct) Move over, Microsoft Windows. Thanks to mobile, Google's Android is now king, as it has become the world's most popular operating system for getting online.Web analytics firm StatCounter reported that, for the first time ever, Android topped the worldwide OS internet usage market share. In March, looking at combined usage across desktop, laptop, tablet and mobile, Android usage hit 37.93 percent. That was enough to narrowly overtake Windows' 37.91 percent.statcounter operating systems worldwide StatCounter “This is a milestone in technology history and the end of an era,” said StatCounter CEO Aodhan Cullen. “It marks the end of Microsoft's leadership worldwide of the OS market, which it has held since the 1980s. It also represents a major breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago.”To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-04-03 06:39:00 Email security appears grounded as attacks continue to take flight (lien direct) Recently inboxes have been hit by the so-called “airline phishing attack.” It is a new take on an old phishing email. It uses multiple techniques to capture sensitive data and deploy an advanced persistent threat (APT).Barracuda Networks has seen this attack with several of its customers, especially in industries that deal with frequent shipping of goods or employee travel, such as logistics, shipping, and manufacturing. The attacker will either impersonate a travel agency or even an employee in HR or finance who is sending an airline ticket or e-ticket. The email will be constructed to appear inconspicuous.The attacker will have researched his target, selecting the airline, destination and price so that these details look legitimate in the context of the company and the recipient, Barracuda reports. After getting the employee to open the email, an APT embedded in an email attachment goes into action. The attachment is typically formatted as a PDF or DOCX document. In this attack, the malware will be executed upon opening the document. To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 06:37:00 Top 5 email security best practices to prevent malware distribution (lien direct) A trusted channelemail encryptionImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don't understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it's often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 06:04:00 Encryption critical for protecting mobile device data (lien direct) If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.For example, more people are storing copies of their driver's license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.One very critical step you can take to secure this is to encrypt your mobile data.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 04:05:00 IDG Contributor Network: Information security in an insecure world (lien direct) If I could give only one piece advice for CTOs and IT teams, it would be this: Data security is not just an IT task-it comes down to people and processes. As a startup CTO, you're often going to lead the charge when it comes to information security for your firm.  According to the Identity Theft Resource Center, U.S. companies and government agencies suffered a record 1,093 data breaches in 2016-a 40 percent increase over 2015. We've all seen the headlines and the high-profile victims, but attackers don't discriminate when it comes to security breaches. Any company can become a victim, leading to losses of your data, your customers' data, financial information, proprietary product information, and, ultimately, a loss of goodwill in the market. As more processes move online and into the cloud, companies increasingly feel this burden of staying secure.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-04-03 03:09:00 Securing the smart home (lien direct) Editor's Note: First in a series of articles on the best ways to deploy and secure smart home technologyLast fall, we saw the rise of the weaponized smart device as the Mirai botnet compromised webcams and other Internet-connected things. Then in February, VIZIO agreed to pay a $2.2 million fine to the FTC for collecting the viewing histories of 11 million smart TV users without their knowledge or consent.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 02:23:00 (Déjà vu) New products of the week 4.3.17 (lien direct) New products of the weekNew products of the weekImage by MicroStrategyOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-03 01:49:07 WikiLeaks\' Assange gets relief from left victory in Ecuador (lien direct) The win in Ecuador's presidential elections of leftist government candidate Lenin Moreno will likely have provided relief to WikiLeaks' founder Julian Assange, who had been threatened with eviction from the country's embassy in London by the opposition candidate.The election in the South American country had aroused interest in part because the conservative opposition candidate, Guillermo Lasso, had said that if elected he would evict Assange within 30 days of assuming  power, because it was costing the country too much to keep him at the embassy.The embassy is being constantly monitored by U.K. police ever since Assange slipped into it in 2012 and was granted asylum by the Ecuador government. Police say they will arrest Assange if he comes out of the embassy to meet an extradition request from Sweden in connection with an investigation into a sexual assault. Assange supporters are concerned that he may be moved from Sweden to the U.S. to face charges in connection with several leaks of confidential U.S. government information.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-02 08:49:00 Government domain seizure notice on Kodi TV was April Fools\' prank (lien direct) On Friday March 31 and part of April 1, visitors to kodi.tv saw a US government domain seizure notice as grabbed by the Wayback Machine. It featured logos of the Department of Justice, National Intellectual Property Rights and Homeland Security Investigations above the following message: This domain name has been seized by ICE - Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court under the authority of 18 U.S.C 981 and 2323.Willful copyright infringement is a federal crime that carries penalties for first time offenders of up to five years in federal prison, a $250,000 fine forfeiture and restitution (17 U.S.C 506, 18 U.S.C 2319). Intentionally and knowingly trafficking in counterfeit goods is a federal crime that carries penalties for first time offenders of up to ten years in federal prison, a $2,000,000 fine, forfeiture and restitution (18 U.S.C 2320)To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 14:30:00 Latest WikiLeaks dump exposes CIA methods to mask malware (lien direct) WikiLeaks may have dealt another blow to the CIA's hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.On Friday, the site dumped the source code to the Marble Framework, a set of anti-forensic tools that WikiLeaks claims the CIA used last year.The files do appear to show “obfuscation techniques” that can hide CIA-developed malicious coding from detection, said Jake Williams, a security researcher at Rendition InfoSec, who has been examining the files.Every hacker, from the government-sponsored ones to amateurs, will use their own obfuscation techniques when developing malware, he said.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 11:32:38 Google\'s Android hacking contest fails to attract exploits (lien direct) Six months ago, Google offered to pay US$200,000 to any researcher who could remotely hack into an Android device by knowing only the victim's phone number and email address. No one stepped up to the challenge.While that might sound like good news and a testament to the mobile operating system's strong security, that's likely not the reason why the company's Project Zero Prize contest attracted so little interest. From the start, people pointed out that $200,000 was too low a prize for a remote exploit chain that wouldn't rely on user interaction."If one could do this, the exploit could be sold to other companies or entities for a much higher price," one user responded to the original contest announcement in September.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 10:57:00 Russian hacking goes far beyond 2016 pro-Trump effort (lien direct) As the Senate Intelligence Committee held its first public hearings examining Russian hacking yesterday, lawmakers received a stark warning that the intrusions have been far broader in scope than the intelligence community's finding that Russian hackers meddled in the 2016 presidential election to help Donald Trump defeat Hillary Clinton.Sen. Marco Rubio (R-Fla.) seemed to confirm as much when he announced that former aides to his presidential campaign, had been targeted by an apparent cyberattack emanating from a Russian IP address last July and again just this Wednesday.Clinton Watts, a senior fellow at the Foreign Policy Research Institute, said that his organization in the past week had detected Russian involvement in a social media campaign aimed at discrediting House Speaker Paul Ryan (D-Wis.).To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 05:28:00 Privacy activist wants to unveil lawmakers\' browser histories (lien direct) After Congress on Tuesday approved a resolution that would toss out significant online privacy protections, one Internet user decided to do something about it.Adam McElhaney, who calls himself a privacy activist and net neutrality advocate, created a website and a GoFundMe page to raise money to buy the internet histories of the legislators who backed the resolution so he can make them available and easily searchable.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 05:19:00 In mining user data, US ISPs must weigh cash vs. privacy (lien direct) U.S. internet service providers are about to face temptation.Now that the broadband privacy rule repeal is almost certain, will they sell their customers' data to marketers, or will they keep it private?The U.S. broadband industry is telling consumers not to worry. Verizon, for instance, said that it remains committed to protecting users' privacy.What that exactly means is unclear, and some in the industry are skeptical.Major broadband providers will be enticed to monetize their customers' data in ad-heavy ways, said Dane Jasper, CEO of Sonic, a small ISP in California.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 05:15:00 After Amazon outage, HealthExpense worries about cloud lock-in (lien direct) Financial services companies as popular targets of cybercriminals for the obvious reason -- they're where the money's at. And health care companies have medical records, which are very valuable on the black market since the information there can be abused in so many ways, and doesn't expire.HealthExpense, which provides health care payment services to banks and their enterprise customers, straddles both worlds."When we started, every new client asked us about security," said Marco Smit, CEO at Sunnyvale, Calif.-based Health Expense."It has to do with the data we're collecting," said company CSO Ken Lee. "We are definitely bound by HIPAA compliance, and we hold all the personal health information and financial information."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-31 05:13:00 Non-malware attacks grow – there are tools for IT security to fight back with (lien direct) More and more attackers are carrying out their work without using malware so they can evade detection by traditional, file-based security platforms, which presents a tough problem for security pros trying to defend against them.Nearly two-thirds of security researchers polled by Carbon Black say they've noted an uptick in these attacks just since the beginning of the year, and aren't confident that traditional anti-virus software can deal with them.+More on Network World: IBM says cybercriminals are starting to grab unstructured data, spam has rebloomed 400% and ransomware has just gone nuts+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 19:16:00 Cisco issues urgent reboot warning for bug in ASA and Firepower appliances (lien direct) Cisco has issued an urgent request to Cisco customers running specific releases of software on their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances to reboot their devices to prevent a device from hanging and stop passing traffic.Cisco said its ASA and FTD devices are affected by a “functional software defect that will cause the device to stop passing traffic after 213 days of uptime” and that the issue is a result of a software regression bug introduced when addressing Cisco bug ID CSCva03607.+More on Network World: IBM on the state of network security: AbysmalTo read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 12:56:04 Senator: Russia used \'thousands\' of internet trolls during US election (lien direct) The Russian government used "thousands" of internet trolls and bots to spread fake news, in addition to hacking into political campaigns leading up to the 2016 U.S. election, according to one lawmaker.Disinformation spread on social media was designed to raise doubts about the U.S. election and the campaign of Democratic presidential candidate Hillary Clinton, said Senator Mark Warner, a Virginia Democrat."This Russian propaganda on steroids was designed to poison the national conversation in America," Warner said Thursday during a Senate hearing on Russian election hacking. The Russian government used "thousands of paid internet trolls" and bots to spread disinformation on social media.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-03-30 11:54:00 10 practical privacy tips for the post-privacy internet (lien direct) ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don't now. Too bad you couldn't pay the legislators as much as the data wolves.You should have been doing these things all along, but now it's time to decide just how much dignity you have. Most of you won't bother. This isn't for you. Click away, and go surf.For those remaining, take these privacy tips seriously.1. Educate yourself about cookies and clean them out regularly For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don't find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we're not surprised because it's from Google-the company whose very life depends on knowing information about you.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 11:37:00 IBM technology creates smart wingman for self-driving cars (lien direct) IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency.+More on Network World: IBM on the state of network security: AbysmalBasically the patented IBM system employs onboard sensors and artificial intelligence to determine potential safety concerns and control whether self-driving vehicles are operated autonomously or by surrendering control to a human driver.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 10:59:00 SS8\'s time machine is designed to automate the hunt for compromises   (lien direct) This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there's no rule to put in the firewall. An attacker's damage can be done long before the rule is created.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 07:47:33 Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server (lien direct) A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported but still widely used.The exploit allows attackers to execute malicious code on Windows servers running IIS 6.0 with the privileges of the user running the application. Extended support for this version of IIS ended in July 2015 along with support for its parent product, Windows Server 2003.Even so, independent web server surveys suggest that IIS 6.0 still powers millions of public websites. In addition, many companies might still run web applications on Windows Server 2003 and IIS 6.0 inside their corporate networks, so this vulnerability could help attackers perform lateral movement if they access such networks through other means.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 05:36:00 IP theft: Declining, or just more stealthy? (lien direct) Eighteen months ago, President Obama and Chinese President Xi Jinping announced, with considerable fanfare, an agreement aimed at curbing economic espionage.According to the Sept. 25, 2015 White House press release, “neither country's government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.”So, with Xi due to meet with President Trump in early April, an obvious question is: Has the agreement been effective?The reviews on that are mixed, but there is general agreement that while it hasn't stopped, the theft of intellectual property (IP) by the Chinese against the US is not as rampant as it was several years ago when The Commission on the Theft of American Intellectual Property estimated total losses, including jobs, competitiveness, stock value, market share, in the hundreds of billions, and former National Security Agency director Gen. Keith Alexander famously called it, “the greatest transfer of wealth in human history.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 04:20:54 Open-source developers targeted in sophisticated malware attack (lien direct) For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware.The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs.The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-30 02:53:29 VMware patches critical virtual machine escape flaws (lien direct) VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines.The patches fix four vulnerabilities that affect VMware ESXi, VMware Workstation Pro and Player and VMware Fusion.Two of the vulnerabilities, tracked as CVE-2017-4902 and CVE-2017-4903 in the Common Vulnerabilities and Exposures database, were exploited by a team from Chinese internet security firm Qihoo 360 as part of an attack demonstrated two weeks ago at Pwn2Own.The team's exploit chain started with a compromise of Microsoft Edge, moved to the Windows kernel, and then exploited the two flaws to escape from a virtual machine and execute code on the host operating system. The researchers were awarded $105,000 for their feat.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 18:18:53 Trump extends Obama executive order on cyberattacks (lien direct) U.S. President Donald Trump is extending by one year special powers introduced by former President Barack Obama that allow the government to issue sanctions against people and organizations engaged in significant cyberattacks and cybercrime against the U.S.Executive Order 13694 was introduced on April 1, 2015, and was due to expire on Saturday, but the president sent a letter to Congress on Wednesday evening informing it of his plans to keep it active."Significant malicious cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States, continue to pose an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States," Trump wrote in the letter. "Therefore, I have determined that it is necessary to continue the national emergency declared in Executive Order 13694 with respect to significant malicious cyber-enabled activities."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 15:18:00 Extreme swallows Brocade\'s data center networking business for $55M (lien direct) Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business for $55 million in cash from its current owner Broadcom.Broadcom bought Brocade last year for about $5.5 billion but has since sold off Brocade's Ruckus Wireless Wi-Fi business for $800 million to Arris International and now the data center networking business to Extreme.+More on Network World: When the Internet Engineering Task Force meets this week in Chicago it will have a new chair – Cisco Fellow Alissa Cooper +To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 14:18:00 How to fend off cyberattacks and data breaches (lien direct) According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). And while distributed denial of service, or DDoS, attacks are still a leading form of cyber warfare, ransomware and malware attacks, targeting users of smartphones and internet of things (IoT) devices, as well as PCs and systems running on Macs and Linux, are also a big threat to small businesses.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-03-29 14:15:00 Congress to US citizens: Want online privacy? Pay up! (lien direct) Tuesday's congressional vote to repeal U.S. restrictions on broadband providers doesn't mean that online privacy is dead. Consumers will just have to pay for it.The coming repeal, which President Trump is expected to sign into law, paves a clearer path for broadband providers to sell customers' internet browsing history and other online data, without their consent.Privacy advocates are worried. Imagine corporate giants snooping on your internet activities, and then bombarding your PC, phone and TV with targeted ads.However, the privacy rule rollback might have an opposite effect too. Expect broadband providers and other internet services to emerge offering online privacy protections -- but at a price.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 10:26:25 Trojan source code leak poised to spur new online banking attacks (lien direct) The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they're used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims' browsers after they have been tricked into providing the second authentication factor.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 09:27:00 What it takes to become an information assurance analyst (lien direct) After spending 13 years working in systems administration and network and desktop support, Simeon Holloway had reached a crossroads in his career.“I had capped out on the knowledge” required for the positions, Holloway says. “Salary-wise, I was capping out, too. I wanted to move in a different direction - something challenging and that was in high demand.” Cybersecurity was at the top of his list. In 2014, he set out on a self-guided journey toward a new career. Today, Holloway is an information assurance analyst for the Georgia Lottery in Atlanta. download What it takes to become an information assurance analyst CSO Online Getting serious about security While still a senior systems administrator for the Centers for Disease Control, Holloway kicked into overdrive, spending his evenings and weekends researching cybersecurity online. “I watched YouTube videos, joined webinars, things like that,” Holloway says. He spent four months studying for and earning his CompTIA Security+ certification, and attended a five-day Certified Ethical Hacker Bootcamp course that helped him get his CEH certification six months later. “I also built my own virtual lab - taking some of the free cyber tools available online, like BackTrack and Kali Linux, and practiced pen testing,” he adds.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 08:35:00 IBM on the state of network security: Abysmal (lien direct) The state of online security is darn dreadful. At least if you look at the results from the IBM Security's 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan project showed up in underground forums, aspiring to sell some licenses as he worked on completing the development of all its modules. The actor promised to deliver future capabilities, such as a Socket Secure (SOCKS) proxy and hidden virtual network computing alongside technical support and free bug fixes. The malware was named Nuclear Bot, or NukeBot, at the time. IBM wrote it has yet to see NukeBot/Micro Bot active in the wild, analyses performed by X-Force and other vendors found that it has the potential to rise in 2017 and bring back commercial Trojan sales in the underground. In 2015, Healthcare was the most attacked industry with Financial Services falling to third, however, attackers in 2016 refocused back on Financial Services. IBM did note that while the healthcare industry continued to be beleaguered by a high number of incidents, attackers hit on smaller targets resulting in a lower number of leaked records. In 2016, only 12 million records were compromised in healthcare - keeping it out of the top 5 most-breached industries. For perspective, nearly 100 million healthcare records were compromised in 2015 resulting in an 88% drop in 2016, IBM stated.To read this article in full or to leave a comment, please click here Yahoo
NetworkWorld.webp 2017-03-29 08:02:00 Invisibility, teleportation among top superpowers that IT pros want (lien direct) Against my better judgment, I'm going to share a few tidbits from a vendor survey - one of those marketing schemes that have become the bane of my existence as a tech journalist (See: "Right back at you vendors: OUR independent study of YOUR independent research")But I figured you'd want to know what superpowers your peers desire, since I'm sure that's a discussion you and your colleagues have had at some point or another (my superpower would be to dodge vendor survey pitches).To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 07:38:00 Updating Apple iOS will protect you from this fake ransomware attack (lien direct) Lookout researchers warned of a campaign involving fake ransomware attacks that attempt to extort money from users of mobile Safari. Victims are accused of accessing illegal pornography and the browser appears to be locked up unless a “ransom” is paid.“Your device has been locked for illegal pornography,” the message stated on a site with security agency icons such as NSA and Interpol at the bottom of the page. An overlay pop-up warned that Safari “cannot open page” with “OK” underneath the message. However, the dialog would not go away no matter how many times the victim tapped “OK.”Lookout said, “Each time he tapped 'OK' he would be prompted to tap 'OK' again, effectively putting the browser into an infinite loop of dialog prompts that prevented him from using the browser.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 07:05:43 Privacy advocates plan to fight Congress\' repeal of ISP privacy rules (lien direct) Privacy advocates haven't given up the fight after the U.S. Congress voted to allow ISPs to sell customers' browsing histories and other personal information without their permission.On Tuesday, the House of Representatives voted 215 to 205 to strike down ISP privacy regulations approved by the Federal Communications Commission only months ago. House's passage of a resolution of disapproval followed a Senate vote to pass the same resolution days earlier. President Donald Trump is expected to sign the Republican-pushed bill. But Senator Ed Markey, a Massachusetts Democrat, said he will introduce new legislation to require the FCC to pass new ISP privacy rules.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 06:06:00 Scammers scare iPhone users into paying to unlock not-really-locked Safari (lien direct) Apple yesterday patched a bug in the iOS version of Safari that had been used by criminals to spook users into paying $125 or more because they assumed the browser was broken.The flaw, fixed in Monday's iOS 10.3 update, had been reported to Apple a month ago by researchers at San Francisco-based mobile security firm Lookout."One of our users alerted us to this campaign, and said he had lost control of Safari on his iPhone," Andrew Blaich, a Lookout security researcher, said in a Tuesday interview. "He said, 'I can't use my browser anymore.'"The criminal campaign, Blaich and two colleagues reported in a Monday post to Lookout's blog, exploited a bug in how Safari displayed JavaScript pop-ups. When the browser reached a malicious site implanted with the attack code, the browser went into an endless loop of dialogs that refused to close no matter who many times "OK" was tapped. The result: Safari was unusable.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 06:01:00 10 things you need to know about the security risks of wearables (lien direct) The risks from corporate use of activity trackers and other wearables is low, some experts say -- especially in comparison to all the other security and privacy risks CISOs, CIOs and IT folks must worry about.That said, as with any connected device, there is risk potential. For example, recent research suggests that devices such as Fitbits can be hacked (when the hacker is within close proximity). By focusing on accelerometers and other motion sensors, researchers at the University of Michigan and the University of South Carolina found that it's possible to, among other things, use sound waves at different frequencies to add thousands of steps to a Fitbit. (Scroll down to read Fitbit's response to the research results.)To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 05:53:00 AI will transform information security, but it won\'t happen overnight (lien direct) Although it dates as far back as the 1950s, Artificial Intelligence (AI) is the hottest thing in technology today.An overarching term used to describe a set of technologies such as text-to-speech, natural language processing (NLP) and computer vision, AI essentially enables computers to do things normally done by people.Machine learning, the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so. The idea is the more data you collect, the smarter the machine becomes.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 05:52:00 Feds to battle cybersecurity with analytics (lien direct) For the federal government to better secure its information systems and support cybersecurity in the private sector, departments and agencies will need to dramatically improve the way they collect, analyze and share information about emerging threats, current and former government officials are cautioning.At a government IT conference convened by Akamai, a content delivery and cloud service provider, officials stressed the importance of casting a wide net for gathering information about cyberthreats, calling for the advancement of new standards and protocols to automate information sharing across the public and private sectors."The more participants we have in our process, the better that process is going to be," said Danny Toler, acting assistant secretary at the Department of Homeland Security's Office of Cybersecurity and Communications.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-29 05:51:00 Expert: NY breach report highlights third-party risk (lien direct) New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state."In 2016, New Yorkers were the victims of one of the highest data exposure rates in our state's history," said Attorney General Eric Schneiderman in a statement released last week. "The total annual number of reported security breaches increased by 60% and the number of exposed personal records tripled."According to the report, the stolen data consisted overwhelmingly of Social Security numbers and financial account information, and hacking was the leading cause of the breaches. The 1,300 breaches involved the private data of 1.6 million state residents, and 81 percent of the breaches involved the loss of Social Security numbers or financial information.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-03-29 04:30:00 IDG Contributor Network: How to bring true interoperability to the Internet of Things (lien direct) The Internet of Things (IoT) is an incredibly diverse space, encompassing a large variety of hardware form factors and software ecosystems unlike anything we have seen in technology. Smartwatches, connected cameras, drones, thermostats, voice-enabled speakers, smart appliances and more-they all live together within the IoT.RELATED: 8 tips for building a cost-effective IoT sensor network But the diversity and innovation that excites many IoT fans is a big challenge not just for manufacturers and developers, but also (and most importantly) consumers. Which technology options should be used when designing or deploying IoT devices? How do they keep up with updated or new operating systems? What about new software and connectivity technologies coming up? Those are just some of today's challenges.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-28 20:12:00 IDG Contributor Network: Smyte wants to get biblical on all those bad online actors (lien direct) It's really hard to come up with good startup names, especially names for which the URL is still available, so it is interesting to see startups go back, way back, to find names. One of those is San Francisco security startup Smyte.Smyte's reason for being is to smite (see what I did there?) bad online actors. Its SaaS software is already used by a number of peer-to-peer marketplaces and social apps to combat spam, scam, online harassment and credit card fraud. In other words, Smyte fights pretty much everything social media has, alas, come to be known for. Smyte is a graduate of Y Combinator's Winter 2015 program.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-28 16:09:19 US House votes to undo broadband privacy rules (lien direct) The U.S. House of Representatives has followed the Senate in voting to repeal privacy rules that can prevent broadband providers from selling customers' internet-browsing histories and other data without their permission.On Tuesday, the House voted 215-205 to do away with the privacy rules that the U.S. Federal Communications Commission passed last year. The rules had yet to come into effect.They require broadband carriers to first obtain opt-in approval from customers before using and sharing their sensitive personal information, such as web browsing history, geo-location data and what applications they've used.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-03-28 13:41:00 FBI warns of attacks on anonymous FTP servers (lien direct) The FBI warns that attackers are targeting vulnerable FTP servers used by small medical and dental offices as a way to obtain medical records and other sensitive personal information.While the dangers of placing sensitive data on these servers is well known, smaller businesses may not have the expertise or motivation to upgrade.The attackers can use the stolen data to harass, intimidate and blackmail these businesses, the FBI says, and may also include using the stolen information to commit fraud.The attackers could also write to the servers in order to store malware and launch attacks, the FBI says.The remedy is to remove any personally identifiable information or protected health information from these servers and replace FTP with something more secure.To read this article in full or to leave a comment, please click here
Last update at: 2024-04-29 00:07:43
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter