Month: February 2017

ComputerWorldIndependent

Here’s how the U.S. government can bolster cybersecurity

Credit to Author: Michael Kan| Date: Fri, 17 Feb 2017 13:53:00 -0800

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before Congress, warning of the dangers of the internet.

Unfortunately, the U.S. government is still struggling to act, Wysopal said. “You’re just going to keep ending up with the status quo,” he said, pointing to the U.S. government’s failure to regulate the tech industry or provide incentives for change.

It’s a feeling that was shared by the experts who attended this week’s RSA cybersecurity show in San Francisco. The U.S. government needs to do more on cybersecurity, but what?  

To read this article in full or to leave a comment, please click here

Read More
IndependentKrebs

Men Who Sent Swat Team, Heroin to My Home Sentenced

Credit to Author: BrianKrebs| Date: Fri, 17 Feb 2017 19:46:56 +0000

It’s been a remarkable week for cyber justice. On Thursday, a Ukrainian man who hatched a plan in 2013 to send heroin to my home and then call the cops when the drugs arrived was sentenced to 41 months in prison for unrelated cybercrime charges. Separately, a 19-year-old American who admitted to being part of a hacker group that sent a heavily-armed police force to my home in 2013 was sentenced to three years probation.

Read More
MalwareBytesSecurity

Explained: Bayesian spam filtering

Credit to Author: Pieter Arntz| Date: Fri, 17 Feb 2017 16:30:10 +0000

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. The name Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to…

Categories:

Tags:

(Read more…)

Read More
SecuritySophos

Live from RSA 2017: Nation states crafting ‘meticulous’ attack code

Credit to Author: Bill Brenner| Date: Fri, 17 Feb 2017 18:12:34 +0000

In the latest installment of live videos beaming directly from San Fransisco Sophos security scribe Bill Brenner chats to Mark Loman, director of engineering for next-generation tech at Sophos, about how nation-state attackers meticulously craft their attack code to evade the most advanced security products. (If you haven’t read our pre-RSA Conference Q&A with Mark, why not catch […]

Read More
ComputerWorldIndependent

IDG Contributor Network: Why February's Patch Tuesday is delayed

Credit to Author: Greg Lambert| Date: Fri, 17 Feb 2017 09:52:00 -0800

After a short break since our Patch Tuesday Debugged analysis in January, it looks like we are going to have some delay with Patch Tuesday in February due to a last minute technical issue with the Microsoft release process.

Microsoft had previously indicated that it was going to change the update process for security-related fixes this month — and a bug discovered during this process change may have caused the delay. Chris Goettl from Ivanti, offers this: “In the hours since Microsoft announced it was going to postpone Update Tuesday I have had a number of people asking if this delay was related to Microsoft’s change to a cumulative update model. If it were just one update that was delayed I would agree, but with all updates being delayed I think it is more of a Windows Update Services infrastructure issue.” I would tend to agree.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Insecure Android apps put connected cars at risk

Credit to Author: Lucian Constantin| Date: Fri, 17 Feb 2017 09:08:00 -0800

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could prevent tampering by hackers.

Researchers from antivirus vendor Kaspersky Lab took seven of the most popular Android apps that accompany connected cars from various manufacturers, and analyzed them from the perspective of a compromised Android device. The apps and manufacturers have not been named.

The researchers looked at whether such apps use any of the available countermeasures that would make it hard for attackers to hijack them when the devices they’re installed on are infected with malware. Other types of applications, such as banking apps, have such protections.

To read this article in full or to leave a comment, please click here

Read More
SecuritySophos

RSA Conference 2017: Security diet for modern attacks

Credit to Author: Bill Brenner| Date: Fri, 17 Feb 2017 16:14:54 +0000

Couldn’t get to RSA? We’ve got you covered on all the juiciest presentations. In this Facebook Live presentation, Sophos principal research scientist Chester Wisniewski and channel SE John Shier use the food pyramid to show what they see as the proper balance of tools in the fight against online attackers.   If you haven’t caught […]

Read More