New Chinese Cybersecurity Threats
CSO's Steve Ragan talks with Cybereason's Chief Product Officer Sam Curry about the rising threat of attacks from nation-state actors, and how to address the unique nature of their attacks.
RSS Reader for Computer Security Articles
CSO's Steve Ragan talks with Cybereason's Chief Product Officer Sam Curry about the rising threat of attacks from nation-state actors, and how to address the unique nature of their attacks.
Credit to Author: BrianKrebs| Date: Wed, 15 Feb 2017 18:03:06 +0000
Late last month, multiple news outlets reported that unspecified law enforcement officials had seized the servers for Leakedsource.com, perhaps the largest online collection of usernames and passwords leaked or stolen in some of the worst data breaches — including billions of credentials for accounts at top sites like LinkedIn, Myspace, and Yahoo. In a development that may turn out to be deeply ironic, it seems that the real-life identity of Leakedsource’s principal owner may have been exposed by many of the same stolen databases he’s been peddling.
Read MoreCredit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 15 Feb 2017 16:46:07 +0000
Our researchers produce a lot of really interesting material. This week, they published a paper called, “U.S. Cities Exposed In Shodan.” The research looks systems that are exposed online…exposure that systems owners aren’t always aware of. The most disturbed statistic in the research is a simple one: the fourth most exposed system is MySQL. I had…
Credit to Author: John Snow| Date: Wed, 15 Feb 2017 17:10:52 +0000
Kaspersky Password Manager now has direct access from browser, voice recognition, and more.
Read MoreCredit to Author: Michael Kan| Date: Wed, 15 Feb 2017 08:13:00 -0800
Businesses targeted in email scams don’t always have to play the victim. They can actually fight back.
Researchers at Dell SecureWorks have documented how they identified a suspected email scammer from Nigeria by essentially playing along with the scheme to fool the attacker into revealing his true whereabouts.
Anyone can use these tips, said Joe Stewart, director of malware research at SecureWorks. “We’re letting [the scammers] give us all the information about themselves,” he said.
The email scheme involved a fraudster impersonating a CEO in what’s called a business email spoofing attack. The goal is often to trick a victim into wiring funds to the scammer’s bank account.
To read this article in full or to leave a comment, please click here
Credit to Author: John Maddison| Date: Wed, 15 Feb 2017 06:24:36 -0800
By now, everyone has heard the numbers. IoT is part of a networking revolution that is transforming the world. Experts predict that by 2020 there will be over 33 billion IoT devices deployed, or 4.3 Internet-connected devices for every man, woman, and child on the planet. Of course, IoT is more than just one thing. There are a variety of IoT devices and categories, each with their own implications. Consumer IoT includes the connected devices we are most familiar with, such as smart cars, phones, watches, laptops, connected appliances, and…
Read MoreCredit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Wed, 15 Feb 2017 13:06:15 +0000
As connected devices continue to intertwine with daily life, the security of those devices and the information they process is a growing conversation. To gain a better understanding of cyber assets exposed to the internet, Trend Micro researchers took a comprehensive look at the exposed assets in the 10 largest U.S. cities – New York…
Credit to Author: Michael Kan| Date: Wed, 15 Feb 2017 04:02:00 -0800
How should the U.S. respond to cyberattacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.
Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show in San Francisco, but they admit that politics and policy conflicts have hampered the government’s approach.
“I wish the federal government could do this, but it’s very hard, unfortunately, due to partisan politics,” said Virginia Gov. Terry McAuliffe, during a speech at the show. “They haven’t been able to take the lead on this issue as they should have.”
To read this article in full or to leave a comment, please click here