Month: October 2017

Four things we learned when Facebook, Google, Twitter testified in Russia inquiry

Read full post Tuesday’s hearing in the Senate marks the first of several hearings involving the tech giants and how Russian-backed hackers and propagandists used their services to spread misinformation and false news.

/ October 31, 2017

North Korea Faces Accusations of Hacking Warship Builder Daewoo

Read full post North Korea suspected by South Korea of stealing warship blueprints from Daewoo Shipbuilding & Marine Engineering.

/ October 31, 2017

North Korea Faces Accusations of Hacking Into Warship Builder Daewoo

Read full post North Korea suspected by South Korea of stealing warship blueprints from Daewoo Shipbuilding & Marine Engineering.

/ October 31, 2017

Office 365 Missed 34,000 Phishing Emails Last Month

Read full post Nearly 10% of emails delivered to Office 365 inboxes were spam, phishing messages, and known or zero-day malware.

/ October 31, 2017

Who Says Brilliant Security Engineers Can’t Be Amazing People Managers?

Read full post Don’t let mid-career stagnation be an exit ramp from the cybersecurity industry. Use it as an opportunity to explore, and to deepen your enthusiasm.

/ October 31, 2017

Trump Administration to Craft New Cybersecurity Plan

Read full post Strategy will mirror President Trump’s cybersecurity Executive Order.

/ October 31, 2017

Equifax is facing a towering pile of class action law suits

Read full post More than 70 different class action suits are in the works

/ October 31, 2017

How to Make a Ransomware Payment – Fast

Read full post Paying ransom in a ransomware attack isn’t recommended, but sometimes, it’s necessary. Here’s how to pay by cryptocurrency.

/ October 31, 2017

10 Scariest Ransomware Attacks of 2017

Read full post A look back at WannaCry, NotPetya, Locky, and other destructive ransomware campaigns to infect the world this year.

/ October 31, 2017

Canadian SMBs: How technology can help you go global

Read full post As you company grows globally you will be faced with many challenges and it can be easy to forget, unintentionally, some of the steps you have gone through to get to the position your company finds itself...

/ October 31, 2017

Stop Counting Vulnerabilities & Start Measuring Risk

Read full post When security teams report on real risk, executive teams can gain a much better understanding of the company’s security posture.

/ October 31, 2017

Phishing Kits Regularly Reused by Cybercriminals

Read full post In 27% of cases, a phishing kit is re-used on more than one host.

/ October 31, 2017

Antimalware Day: Genesis of viruses… and computer defense techniques

Read full post To honor the work of Dr. Fred Cohen and Professor Len Adleman, and the foundation they laid for research of computer threats, we decided to declare November 3 as the first ever Antimalware Day. The post Antimalware...

/ October 31, 2017

London Heathrow Airport’s security laid bare by one lost USB stick

Read full post If you tried to invent a risky way to transport data it’s hard to imagine you’d better the USB stick for calamitous efficiency

/ October 31, 2017

Software code signing certificates worth more than guns on the Dark Web

Read full post Digital code signing certificates are more expensive than credit cards or weapons.

/ October 31, 2017

Majority of Employees Hit With Ransomware Personally Make Payment

Read full post Office workers pay an average ransom of $1,400, according to a new report.

/ October 31, 2017

Troll gets 5 years for framing brother-in-law as terrorist and paedophile

Read full post The 26-year-old man set up fake Twitter, Facebook and YouTube accounts to publish praise for terror attacks and Islamic State

/ October 31, 2017

Top 10 Nastiest Ransomware Attacks of 2017

Read full post We’re revealing the top 10 nastiest ransomware attacks from the past year. NotPetya came in on our list as the most destructive ransomware attack of 2017, followed closely by WannaCry and Locky in the number two and...

/ October 31, 2017

Gaza Cybergang Acquires New Tools, Expands Operations

Read full post Warning from Kaspersky Lab second in recent month involving heightened threat activity in Middle East and North Africa.

/ October 30, 2017

Google Bug Database Flaws Expose Severe Vulnerabilities

Read full post A security researcher accessed the most critical bugs in Google products and services by spoofing a corporate email address.

/ October 30, 2017

Security Gets Social: 10 of Dark Reading’s Most Shared Stories

Read full post We scared up our most popular stories on Facebook, Twitter, and LinkedIn

/ October 30, 2017

Can ARM save the Internet of Things?

Read full post Can the IoT be saved from its breakneck growth and breathtaking insecurity?

/ October 30, 2017

Kaspersky Expects US Sales to Decline in 2017

Read full post CEO points to an “information war” against his company as the cause of the revenue drop.

/ October 30, 2017

Dell forgot to renew the domain it uses for PC backups

Read full post A squatter bought it and owned it for a month

/ October 30, 2017

​A flaw in Google’s bug database exposed private security vulnerability reports

Read full post The bug allowed the researcher to see the most sensitive vulnerabilities in Google’s services.

/ October 30, 2017

Screen Sharing: Dark Reading Caption Contest Winners

Read full post It was a tough job choosing among our strongest field yet, with more than 125 submissions. And the winners are …

/ October 30, 2017

Preventing Credential Theft: A Security Checklist for Boards

Read full post Board members pose a unique risk for business, but proper planning helps.

/ October 30, 2017

Hacking site hacked by hackers

Read full post It sounds funny, but remember: if hackers can be hacked, then so can you, if you aren’t careful

/ October 30, 2017

Heathrow security plans ‘found on USB stick left in the street’

Read full post This weekend British tabloid newspaper The Sunday Mirror warned of a potential “risk to national security” after a memory stick containing sensitive information about Heathrow airport was reportedly “found in the street.” The post Heathrow security plans...

/ October 30, 2017

Fear the Reaper? Experts reassess the botnet’s size and firepower

Read full post Security researchers now say the botnet could be only as big as 28,000 infected devices, but warn that the figure could balloon in size at any given time.

/ October 30, 2017

It’s Time to Change the Cybersecurity Conversation

Read full post The IT security industry needs more balance between disclosure of threats and discussion of defense practices – and greater sharing of ideas

/ October 30, 2017

Monday review – the hot 17 stories of the week

Read full post From DDE email attacks and Bad Rabbits to the iPhone privacy loophole that’s been staring us in the face, and more!

/ October 30, 2017

ESET research team assists FBI in Windigo case – Russian citizen sentenced to 46 months

Read full post Relating the collaboration between ESET experts and the FBI about the Windigo’s operation, which ended with the sentencing of Maxim Senakh. The post ESET research team assists FBI in Windigo case – Russian citizen sentenced to 46...

/ October 30, 2017

Windigo Still not Windigone: An Ebury Update

Read full post In 2014, ESET researchers wrote a blog post about an OpenSSH backdoor and credential stealer called Linux/Ebury In 2017, the team found a new Ebury sample. The post Windigo Still not Windigone: An Ebury Update appeared first...

/ October 30, 2017

Firefox takes a bite out of the canvas ‘super cookie’

Read full post Finally, one of the major browsers is doing something about canvas fingerprinting

/ October 29, 2017

Web Attacks Spike in Financial Industry

Read full post Web application compromise beats human error as the top data breach cause, putting finance companies at risk for larger attacks, according to a new study.

/ October 27, 2017

Identity Theft Ring Hit with Credit Card Fraud Indictment

Read full post A federal grand jury indicts six individuals on criminal charges relating to credit card and debit card fraud.

/ October 27, 2017

The iOS privacy loophole that’s staring you right in the face

Read full post Your iPhone’s camera and microphone could be capturing more than you realize

/ October 27, 2017

Debate rages over divisive US surveillance law renewal

Read full post The lines are drawn, with predictable players on each side

/ October 27, 2017

3 Steps to Reduce Risk in Your Supply Chain

Read full post Many companies have very limited visibility into their vendors’ security posture — and some may have thousands of vendors. Here are steps that every company should take to lock down their supply chains.

/ October 27, 2017