Locky Bart ransomware and backend server analysis

The developers of Locky Bart already had very successful ransomware campaigns running called “Locky” and “Locky v2”. After some users reported being infected with Locky Bart, we investigated it to find the differences as to gain greater knowledge and understanding of this new version.

Categories:

Tags:

(Read more…)

Read more

iPads ‘more secure than voting systems’ — claim

Dutch security researcher Sijmen Ruwhof has examined the software used at Dutch polling stations to send election results, and now claims “the average iPad is more secure than the Dutch voting system.”

Hack the vote

Local television station RTL asked the researcher to examine the security of Dutch voting systems after they heard they used weak SHA1 cryptography in certain parts of the system.

Dutch elections have used paper-based voting since 2009, when the government banned electronic voting on security grounds.

To read this article in full or to leave a comment, please click here

Read more

Threat Actors will come up with new Targeted Attack Tactics that Circumvent Current Anti-evasion Solutions

In the Trend Micro 2017 Security Predictions report, we cover many of the threats that organizations will have to deal with this year and none could be more challenging that a targeted attack. We recently saw a report from the Identity Theft Resource Center which said 2016 had the most data breaches in US history. Within…

Read more

Innovation Insights: Defining and Securing IoT


Sometimes it’s helpful to characterize the IoT with some more precision; I like to place them in three categories. The first, Consumer IoT, which includes the connected devices we are most familiar with, such as smart phones, watches, and connected appliances and entertainment systems. The other two, Commercial IoT and Industrial IoT, are made up of things many of us never see. Commercial IoT includes things like inventory controls, device trackers, and connected medical devices, and the Industrial IoT covers…

Read more

SonicWall CEO talks of life after Dell spinout

SonicWall has been through it all. The San Jose, CA-based security company began as a hot start up, went public, then private, was acquired by Dell and then spun off to a private equity firm as part of the massive Dell/EMC merger in 2016. In the wake of that change, SonicWall also got a new CEO, Bill Conner, a long-time security and tech industry leader, who took the helm in November.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Categories:

Tags:

(Read more…)

Read more