All posts by patrickdigitalmedia

Artificial Intelligence: Cybersecurity Friend or Foe?

Read full post The next generation of situation-aware malware will use AI to behave like a human attacker: performing reconnaissance, identifying targets, choosing methods of attack, and intelligently evading detection.

/ May 11, 2017

Unhappy 39th birthday, spam, and many unhappy returns

Read full post As computing reaches middle age, expect to see more of these kinds of anniversaries

/ May 11, 2017

Anti-trust, EU complaints and the anti-malware industry

Read full post ESET’s Tony Anscombe takes a closer look at the anti-malware industry. The post Anti-trust, EU complaints and the anti-malware industry appeared first on WeLiveSecurity

/ May 11, 2017

One more way to get busted on the Dark Web

Read full post Tor users suspected of child abuse imagery may have visited an outside file-sharing service – simply because Tor is so slow at routing traffic

/ May 11, 2017

Businesses Not Properly Securing Microsoft Active Directory

Read full post Businesses overlook key security aspects of AD, leaving sensitive data open to external and internal attacks, new study shows.

/ May 10, 2017

‘Systemic’ Cyberattack Most Likely to Hit Financial, Energy Sectors

Read full post The financial services industry is among the top five industries that likely face a systemic cyberattack, according to a survey released today.

/ May 10, 2017

Your IoT Baby Isn’t as Beautiful as You Think It Is

Read full post Both development and evaluation teams have been ignoring security problems in Internet-connected devices for too long. That must stop.

/ May 10, 2017

News in brief: Game of Thrones tells cast to use 2FA; Cisco flaw patched; Windows 10 on 500m devices

Read full post Your daily round-up of some of the other stories in the news

/ May 10, 2017

Minority Report in Chicago as police aim to stop crime before it happens

Read full post As gun crime in Chicago reaches record levels, police claim that it’s having an impact on crime prevention, but civil rights campaigners are less convinced

/ May 10, 2017

APT28, Turla Nation-State Groups Deployed Multiple 0Days in Recent Attacks

Read full post Attack campaigns by APT28, Turla, and an unidentified group showcase easy availability of zero-days.

/ May 10, 2017

How to hack a Jeep Cherokee – but don’t try this at home, kids

Read full post Carmakers are going to have to get much better at securing their vehicles now that the researchers who demonstrated how to hack a Cherokee Jeep added their notes to the tools already online

/ May 10, 2017

FTC Launches Cybersecurity Resource Website for SMBs

Read full post Federal Trade Commission website offers free tips and information for small businesses.

/ May 10, 2017

Holidaymakers warned against increased threat from online fraudsters

Read full post An increasing number of holidaymakers are finding themselves targeted by online fraudsters, according to a new study. The post Holidaymakers warned against increased threat from online fraudsters appeared first on WeLiveSecurity

/ May 10, 2017

A bot is flooding the FCC’s website with fake anti-net neutrality comments

Read full post Several people we spoke to denied they had posted comments to the FCC’s feedback pages, in which one-in-ten comments appear to be fake.

/ May 10, 2017

Extreme Makeover: AI & Network Cybersecurity

Read full post In the future, artificial intelligence will constantly adapt to the growing attack surface. Today, we are still connecting the dots.

/ May 10, 2017

The Google Play apps that say they don’t collect your data – and then do

Read full post Our researchers have found more than 50 apps in Google Play that contain XavirAd, which says it doesn’t collect your personal information and then promptly sucks it up and sends it back to the mothership

/ May 10, 2017

SLocker Ransomware Variants Surge

Read full post SLocker, one of the top 20 Android malware families, has seen a six-fold increase in the number of new versions over the past six months.

/ May 10, 2017

The Long Tail of the Intel AMT Flaw

Read full post Organizations impacted by easily exploitable privilege escalation vulnerability may need time to apply firmware patches, analysts say.

/ May 10, 2017

IDC: 1 in 5 companies prepared for GDPR

Read full post A quarter of European companies admit they were not aware of GDPR, with more than half unsure of the impact it will have, according to a new survey. The post IDC: 1 in 5 companies prepared for...

/ May 10, 2017

IDC: 1 in 4 companies have no clue GDPR is coming their way

Read full post A quarter of European companies admit they were not aware of GDPR, with more than half unsure of the impact it will have, according to a new survey. The post IDC: 1 in 4 companies have no...

/ May 10, 2017

Military ‘revenge porn’ investigation leads to 21 felony cases

Read full post Despite facial recognition and other technology, it’s still a gruelling cat-and-mouse game for investigators

/ May 10, 2017

Trump sacks FBI chief James Comey amid Russia probe

Read full post Comey was investigating Trump’s team and possible links to Russia.

/ May 10, 2017

Adobe patches critical vulnerabilities in Flash, OEM

Read full post Seven of the security flaws are critical issues.

/ May 10, 2017

Hackers Face $8.9 Million Fine for Law Firm Breaches

Read full post A federal court orders three Chinese nationals to pay $8.9 million in fines and penalties for hacking into two law firms and using stolen confidential information to trade stocks.

/ May 9, 2017

New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack

Read full post The Persirai IoT botnet, which targets IP cameras, arrives hot on the heels of Mirai and highlights the growing threat of IoT botnets.

/ May 9, 2017

Good news! The entire Senate just embraced web encryption

Read full post Remember this for next time lawmakers bring out the pitchforks.

/ May 9, 2017

Android App Permission in Google Play Contains Security Flaw

Read full post Android’s app permission mechanisms could allow malicious apps in Google Play to download directly onto the device.

/ May 9, 2017

Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy

Read full post Sednit is back – this time with two more zero-day exploits embedded in a phishing email titled Trump’s_Attack_on_Syria_English.docx. The post Sednit adds two zero-day exploits using ‘Trump’s attack on Syria’ as a decoy appeared first on WeLiveSecurity

/ May 9, 2017

Shining a Light on Security’s Grey Areas: Process, People, Technology

Read full post The changing distributed and mobile business landscape brings with it new security and privacy risks. Here’s how to meet the challenge.

/ May 9, 2017

Mac video app HandBrake – now with free spyware

Read full post Last week, crooks hacked one of the HandBrake app’s download servers and used the popular video app to distribute Mac spyware.

/ May 9, 2017

News in brief: Google teases Fuschia OS; Microsoft patches ‘crazy bad’ flaw; Vienna raps Facebook

Read full post Your daily round-up of some of the other stories in the news

/ May 9, 2017

FCC site falters as star urges viewers to protest over net neutrality

Read full post FCC says the websites problems were because of a DDoS attack, not the ‘flying monkeys’ unleashed by John Oliver

/ May 9, 2017

10 Free or Low-Cost Security Tools

Read full post At a time when many organizations struggle with security funding, open-source tools can help cut costs for certain businesses.

/ May 9, 2017

FCC confirms DDoS attacks

Read full post The Federal Communications Commission in the US has confirmed that it experienced multiple distributed denial-of-service attacks (DDoS) over the weekend. The post FCC confirms DDoS attacks appeared first on WeLiveSecurity

/ May 9, 2017

Lawyers demand answers after artist forced to unlock his phone

Read full post Artist who arrived home in San Francisco faced ‘unconstitutional’ demands to unlock his phone

/ May 9, 2017

Deciphering the GDPR: What You Need to Know to Prepare Your Organization

Read full post The European Union’s upcoming privacy regulations are incredibly complex. Here are four important points to keep in mind.

/ May 9, 2017

Downloading Chrome for Android? Be careful – we’ve found an evil twin

Read full post Techniques used to poison a version of the Android Chrome browser with Andr/SandRat-C, Andr/Rootnik-AH are finding their way into other apps – and into the Play Store

/ May 9, 2017

Jackware hits the big screen in #Fast8: Fate of the Furious

Read full post ESET’s Stephen Cobb examines how close we are to the kind of jackware technology shown in the latest Fast and Furious film franchise, Fate of the Furious. The post Jackware hits the big screen in #Fast8: Fate...

/ May 9, 2017