Month: June 2017

IndependentKrebs

Why So Many Top Hackers Hail from Russia

Credit to Author: BrianKrebs| Date: Thu, 22 Jun 2017 14:29:11 +0000

Conventional wisdom says one reason so many hackers seem to hail from Russia and parts of the former Soviet Union is that these countries have traditionally placed a much greater emphasis than educational institutions in the West on teaching information technology in middle and high schools, and yet they lack a Silicon Valley-like pipeline to help talented IT experts channel their skills into high-paying jobs. This post examines the first part of that assumption by examining a breadth of open-source data. The supply side of that conventional wisdom seems to be supported by an analysis of educational data from both the U.S. and Russia, which indicates there are several stark and important differences between how American students are taught and tested on IT subjects versus their counterparts in Eastern Europe.

Read More
SecurityTrendMicro

The Inside Scoop on the World’s Leading Bug Bounty Program

Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 22 Jun 2017 13:00:22 +0000

Within the security researcher community, the Zero Day Initiative (ZDI) program is a well-known entity, representing the world’s largest vendor agnostic bug bounty program. Customers of the TippingPoint Intrusion Prevention Systems (IPS) and Threat Protection Systems (TPS) know the ZDI as the group that buys 0-days so they have protections before the affected vendor releases…

Read More
FortinetSecurity

The Role of the Healthcare CIO Yesterday, Today, and Tomorrow

Credit to Author: Susan Biddle| Date: Thu, 22 Jun 2017 13:00:03 +0000

Today’s healthcare networks are intricate ecosystems of different networks comprised of a wide variety of connected devices and moving data, but they weren’t always this open. The industry as a whole has had to rapidly shift gears. Healthcare data now flows faster than ever, and it isn’t slowing down. As a result, the role of the healthcare chief information officer (CIO) has had to expand and adapt. As networks expand and connected devices permeate the healthcare landscape, the CIO will continue to play an increasingly important…

Read More
QuickHealSecurity

AES-NI Ransomware adopts combination of Fileless and Code Injection technique

Credit to Author: Quick Heal Security Labs| Date: Thu, 22 Jun 2017 12:33:26 +0000

Cybercriminals are adopting unique ways for spreading malware and this has been evident in the cases of the Cerber ransomware where the RIG exploit was used and the WannaCry ransomware which used the SMBv1 vulnerability. And now it’s the AES-NI ransomware which uses a combination of fileless and code injection…

The post AES-NI Ransomware adopts combination of Fileless and Code Injection technique appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
SecurityTrendMicro

Bringing Data Center Security to Cloud Speed

Credit to Author: Justin Foster| Date: Thu, 22 Jun 2017 12:00:21 +0000

Last week, while visiting the product management team for Deep Security, I asked about their latest release. They surprised me by saying the big news is that there IS a release. Confused, I asked them to elaborate… You see, when you develop software, you’re faced with many choices, one of which is deciding whether to…

Read More
SecuritySophos

When does security turn into snooping? [PODCAST]

Credit to Author: Paul Ducklin| Date: Thu, 22 Jun 2017 11:08:45 +0000

Sophos cybersecurity specialist Luke Groves explains how to take charge of security inside your organisation without creating an uncomfortable culture of snooping and surveillance.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=40203&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/5a8oSbfKUeY” height=”1″ width=”1″ alt=””/>

Read More
ComputerWorldIndependent

Not the disaster recovery we were expecting

Credit to Author: Sharky| Date: Thu, 22 Jun 2017 03:00:00 -0700

IT pilot fish working for a city government keeps getting complaints from people in the Public Works department that something’s seriously wrong with their documents.

“The Public Works director, his assistant and another part-time employee told me that every time they make changes to a document, they have to keep re-saving their work,” says fish. “They also have to combine all of their work into yet another saved and current complete document.

“I asked the Public Works director to start at the beginning. Are you sharing this file off the server? ‘Yes,’ came his curt and snarky reply.

“OK, which file or folder is your document in? ‘It’s right here.’

To read this article in full or to leave a comment, please click here

Read More