Hack-back bill would legalize companies hacking their attackers

What could possibly go wrong? Source: Naked Security Sophos Hack-back bill would legalize companies hacking their attackers

Energy Regulator Acts to Improve Power Grid Security

With growing concern over nation-state cyber attacks comes an increasing need to secure the critical infrastructure. In the Quadrennial Energy Review published in January 2017, the U.S. Energy Department wrote,…

‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher

Malware dubbed IOTroop that researchers say is “worse than Mirai” has already infected one million businesses worldwide. Source: threatpost.com/ ‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says…

Booz Allen to Acquire AI-based Morphick

Contracting giant Booz Allen is to acquire cybersecurity firm Morphick. Few details have been made public — there is no statement on the price involved nor the future of existing…

What’s coming next in the world of malware? [VIDEO]

We asked one of the world’s top threat reasearchers, “What next?” Here’s his fascinating reply… Source: Naked Security Sophos What’s coming next in the world of malware? [VIDEO]

Google’s Advanced Protection Program: extra security at a cost

How much hassle would you put up with to make your account more secure? Source: Naked Security Sophos Google’s Advanced Protection Program: extra security at a cost

Locky Uses DDE Attack for Distribution

While continuing to spread via spam emails sent by the Necurs botnet, the Locky ransomware has switched to new attack techniques in recent campaigns, in an attempt to evade detection…

Driving Security Orchestration with Your Cyber Threat Intelligence Playbook

A newish buzzword in the cybersecurity world is “orchestration”. Which to me is the junction where people, process and technology all come together. It’s where people build automation into process…

Necurs-Based DDE Attacks Now Spreading Locky Ransomware

Researchers have spotted Locky ransomware infections emanating from the Necurs botnet via Word attachments using a DDE technique that Microsoft says is an Office feature and does not merit a…

EquiFIX – Lessons Learned From the Most Impactful Breach in U.S. History

While Equifax is the latest major data breach to hit the headlines, we know it will not be the last. How prepared is your organization if you were similarly targeted? read…

5 ways to do 15 minutes of cybersecurity without a computer

Taking a ‘tech free’ 15 minutes doesn’t mean taking 15 minutes off, you’ve got computers to protect! Source: Naked Security Sophos 5 ways to do 15 minutes of…

Visa Makes Biometrics Easier for Financial Institutions

The acceptance and adoption of biometrics as a primary or second factor in multi-factor authentication has been considerably slower than expected. There are signs now, however, that it is finally…

Using Yara rules with Volatility , (Fri, Oct 20th)

YARA is a tool designed to help malware researchers identify and classify malware samples. It’s been called the pattern-matching Swiss Army knife for security researchers . Yarascan is a volatility plugin that…

Google Prompt Now Primary Choice for 2-Step Verification

Google has taken yet another step toward improving the security of its users by making Google prompt the primary choice for 2-Step Verification (2SV), instead of SMS. read more …

Threatpost News Wrap, Oct. 20, 2017

This week’s Threatpost News Wrap Podcast recaps the ROCA, KRACK and Boundhook attacks, as well as the release of Google Advanced Protection for Gmail. Source: threatpost.com/ Threatpost News Wrap,…

Previous Page · Next Page