Month: March 2017

ComputerWorldIndependent

Russia will strike U.S. elections again, FBI warns

Credit to Author: Michael Kan| Date: Mon, 20 Mar 2017 13:16:00 -0700

Future U.S. elections may very well face more Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.

“They’ll be back,” said FBI director James Comey. “They’ll be back in 2020. They may be back in 2018.”

Comey made the comment during a congressional hearing on Russia’s suspected efforts to meddle with last year’s presidential election. Allegedly, cyberspies from the country hacked several high-profile Democratic groups and people, in an effort to tilt the outcome in President Donald Trump’s favor.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Pwn2Own ends with two virtual machine escapes

Credit to Author: Lucian Constantin| Date: Mon, 20 Mar 2017 12:08:00 -0700

Two teams of researchers managed to win the biggest bounties at this year’s Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main operating system in case of compromise. For example, many malware researchers execute malicious code or visit compromise websites inside virtual machines to observe their behavior and contain their impact.

One of the main goals of hypervisors like VMware Workstation is to create a barrier between the guest operating system that runs inside the virtual machine and the host OS where the hypervisor runs. That’s why VM escape exploits are highly prized, more so than browser or OS exploits.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Fragmentation: the silent killer in security management

Credit to Author: Ryan Francis| Date: Mon, 20 Mar 2017 10:28:00 -0700

Read More
ComputerWorldIndependent

7 universal rules of threat intelligence

Credit to Author: Ryan Francis| Date: Mon, 20 Mar 2017 10:00:00 -0700

Threatening
1 threatening

Image by Thinkstock

Cybersecurity is a heroic task. Every day, businesses and organizations face an onslaught of attacks from malicious actors across the globe. As part of your organization’s cybersecurity efforts, it is your job to not just catch these attacks as they happen, but try to mitigate threats and prevent them before anything occurs.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Private photos of more celebrities leaked in Fappening 2.0

Credit to Author: Darlene Storm| Date: Mon, 20 Mar 2017 09:51:00 -0700

Here we go again with another round of The Fappening which was also known as Celebgate.

The Fappening 2.0, or Celebgate 2.0, started with private photos of Emma Watson and Amanda Seyfried circulating on the “dark web” and then 4chan last week before the images made it to Reddit.

Softpedia reported that more private images of celebrities are also circulating online, including pictures of the following actresses and models: “Rose McGowan (actress), Katie Cassidy (actress), Alyssa Arce (model), Rhona Mitra (actress), Analeigh Tipton (figure skater & actress), Iliza Shlesinger (comedian), Jilliain Murray (actress), Paige (WWE star), Dylan Penn (model, daughter of Sean Penn), Kristanna Loken (actress), April Love Geary (model), Trieste Kelly Dunn (actress), and Lili Simmons (actress).” The article claims that the leak also included footage of at least one celebrity engaging in sexual acts.

To read this article in full or to leave a comment, please click here

Read More