Month: March 2017

FortinetSecurity

The Essential 8: ASD’s strategies to mitigate cyber security incidents

Credit to Author: Katrina Fox| Date: Mon, 27 Mar 2017 15:24:26 -0700

The Australian Signals Directorate’s (ASD) ‘Essential 8’ strategies to mitigate cyber security incidents represent a set of cyber security best practices that, when implemented successfully, will provide your agency with a baseline cyber security posture. The Essential 8 expand upon the ‘Top 4’ mitigation strategies, part of the government’s Protective Security Policy Framework, which have been mandatory for federal agencies since 2014. ASD has stated that implementing the Top 4 mitigation strategies will…

Read More
ComputerWorldIndependent

Blockchain can help secure medical devices, improve patient privacy

Credit to Author: Tim Greene| Date: Mon, 27 Mar 2017 11:20:00 -0700

BOSTON — Blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.

The downsides would include mistrust of the technology because of blockchain’s potential performance problems, and its association with ransomware and use as payment for illegal items on the Dark Web, Partners’ Deputy CISO Esmond Kane told the SecureWorld audience last week in Boston.

On the other hand, the decentralized, encrypted public ledger could have a wealth of applications in healthcare, Kane says. These include streamlining the resolution of insurance claims, management of internet of things medical devices and providing granular privacy settings for personal medical data.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

iPad bomb plot allegedly led to electronic device ban on flights

Credit to Author: Darlene Storm| Date: Mon, 27 Mar 2017 08:58:00 -0700

A plot allegedly involving an iPad bomb was one of the factors which sparked US and UK restrictions on bringing electronic devices larger than a smartphone into the passenger cabin of flights traveling from the Middle East.

It’s unclear if the alleged bomb was inside an iPad knockoff or used an iPad shell, but the tablet filled with explosives was not in itself enough to trigger the electronic device ban. An unnamed source told The Guardian that the US and UK bans “were not the result of a single specific incident but a combination of factors.”

To read this article in full or to leave a comment, please click here

Read More
MalwareBytesSecurity

Mobile Menace Monday: Preinstalled adware and sometimes worse

Credit to Author: Nathan Collier| Date: Mon, 27 Mar 2017 16:00:52 +0000

BLU manufactured mobile devices have been discovered with preinstalled adware known as Android/Adware.YeMobi.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: Preinstalled adware and sometimes worse appeared first on Malwarebytes Labs.

Read More
IndependentKrebs

Alleged vDOS Owners Poised to Stand Trial

Credit to Author: BrianKrebs| Date: Mon, 27 Mar 2017 13:56:31 +0000

Police in Israel are recommending that the state attorney’s office indict and prosecute two 18-year-olds suspected of operating vDOS, until recently the most popular attack service for knocking Web sites offline. On Sept. 8, 2016, KrebsOnSecurity published a story about the hacking of vDOS, a service that attracted tens of thousands of paying customers and facilitated countless distributed denial-of-service (DDoS) attacks. That story named two young Israelis — Yarden Bidani and Itay Huri — as the likely owners and operators of vDOS, and within hours of its publication the two were arrested by Israeli police, placed on house arrest for 10 days, and forbidden from using the Internet for a month.

Read More
MicrosoftSecurity

Detecting and mitigating elevation-of-privilege exploit for CVE-2017-0005

Credit to Author: msft-mmpc| Date: Mon, 27 Mar 2017 15:00:01 +0000

On March 14, 2017, Microsoft released security bulletin MS17-013 to address CVE-2017-0005, a vulnerability in the Windows Win32k component that could potentially allow elevation of privileges. A report from a trusted partner identified a zero-day exploit for this vulnerability. The exploit targeted older versions of Windows and allowed attackers to elevate process privileges on these platforms. In this article, we…

Read More