By virtualizing the Android OS, Cog Systems says it adds more security to smartphones

Credit to Author: Peter Sayer| Date: Mon, 27 Feb 2017 10:31:00 -0800

It sounds like a smartphone user’s worst fear: Software that starts up before the phone’s operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface.

This is not some new kind of ransomware, though. This is the D4 Secure Platform from Cog Systems.

The product grew out of custom security software the company developed for governments, and which it saw could also be put to use in the enterprise as a way to make smartphones more productive while still maintaining a high level of security.

It includes a Type 1 hypervisor, a virtualized VPN and additional storage encryption that wrap the standard Android OS in additional layers of protection largely invisible to the end user.

To read this article in full or to leave a comment, please click here

Read more

New Neutrino Bot comes in a protective loader

Credit to Author: Malwarebytes Labs| Date: Mon, 27 Feb 2017 19:30:31 +0000

We take another look at the Neutrino bot, known for its diverse feature set ranging from snooping on victims to performing DDos attacks. This latest version includes a hardened protective layer aimed at defeating sandboxes and hiding the bot from discovery.

Categories:

Tags:

(Read more…)

The post New Neutrino Bot comes in a protective loader appeared first on Malwarebytes Labs.

Read more

Sophos Mobile 7 is heading to Spain for a big unveiling

Credit to Author: Petter Nordwall| Date: Mon, 27 Feb 2017 19:49:37 +0000

Sophos Mobile 7 is unveiled at Mobile World Congress 2017. Barcelona: the city of Gaudí, Miró, Picasso, a pretty decent football team, and so many more absolutely fantastic things. But, it’s more than that; every year in early spring, Barcelona is also the venue for the world’s biggest gathering of the mobile industry. Thousands upon […]

Read more

DNSSEC: why do we need it?

Credit to Author: Pieter Arntz| Date: Mon, 27 Feb 2017 18:00:54 +0000

We take a look at what DNSSEC is and why we need it. Plus an overview of how far the implementation has progressed in the Netherlands based on a SIDN report.

Categories:

Tags:

(Read more…)

The post DNSSEC: why do we need it? appeared first on Malwarebytes Labs.

Read more

Five Areas for Cybersecurity Innovation in 2017

Credit to Author: Michael Xie| Date: Mon, 27 Feb 2017 08:55:47 -0800

The world never stands still. In the technology space, this means that constant innovation and discovery is the key to a solution provider’s survival and growth. In the cybersecurity arena, this creed is even more vital. Many hackers are brilliant people. There’s only one way to get the better of them – be even more brilliant. And faster and more creative. Which is why R&D is crucial in the security technology business. Cybersecurity solution providers must deliver open, integrated security and networking technologies…

Read more

You don't need to break my heart…

Credit to Author: Axelle Apvrille| Date: Mon, 27 Feb 2017 08:54:12 -0800

X-ray image of installed pacemaker showing wire routing – Image from Wikipedia A few days ago, journalists reported a man had been charged with arson using data retrieved from his own pacemaker (see here). One article showed a "funny" image of a man's chest with stitches to insert or access the pacemaker. This, and the comments, led me to some research on pacemakers. No, you don't need to open the patient to retrieve data from the pacemaker Pacemakers transmit data over radio frequencies. They typically use the 402-405…

Read more

IDG Contributor Network: February Patch Tuesday updated

Credit to Author: Greg Lambert| Date: Mon, 27 Feb 2017 07:45:00 -0800

Microsoft released a single update last week with this February Patch Tuesday, after a week’s delay. Or, perhaps MS17-005 is considered an out-of-band update from Microsoft?

I am not sure, as it does not look like we will see the usual accompanying updates to Microsoft, .NET and the Windows (desktop and server) platforms. This sole update to Adobe Flash Player is worth deploying immediately. Evergreen browsers such as Microsoft Edge and Google Chrome will automatically update (using the default settings) and so will patch this serious memory-related vulnerability in Flash Player. 

To read this article in full or to leave a comment, please click here

Read more

MWC 2017: Avast finds over 5.3 million hackable smart devices in Spain

Credit to Author: Darlene Storm| Date: Mon, 27 Feb 2017 07:09:00 -0800

Since Mobile World Congress takes place in Barcelona, security product vendor Avast took aim at the Internet of Things there. Among the findings in this latest research experiment, Avast discovered there were more than 22,000 webcams and baby monitors which are vulnerable to attack. Of course this is not a problem only in Spain, but hacking vulnerable baby monitors and webcams to spy on unsuspecting people in their homes is especially creepy and invasive.

Avast has a habit of conducting Wi-Fi experiments at big events such as the Republican National Convention and Mobile World Congress 2016. The research for MWC 2017 dived deeper than IoT flaws in Barcelona as Avast also took a look at IoT security in Spain and found it lacking. It found more than 5.3 million vulnerable smart devices in Spain, 493,000 of those in Barcelona.

To read this article in full or to leave a comment, please click here

Read more