Month: January 2018

ScadaICSSchneider

Your Home: The Reflection of Your Personality Shown in Colors, Artwork and Lighting

Credit to Author: Xia Huang| Date: Wed, 24 Jan 2018 15:31:12 +0000

Despite the old saying, walls do talk, and they speak volumes about the people living within them. Home interiors are generally viewed as expressions of their owners’ personalities. If you… Read more »

The post Your Home: The Reflection of Your Personality Shown in Colors, Artwork and Lighting appeared first on Schneider Electric Blog.

Read More
IndependentKrebs

Expert: IoT Botnets the Work of a ‘Vast Minority’

Credit to Author: BrianKrebs| Date: Wed, 24 Jan 2018 15:38:52 +0000

In December 2017, the U.S. Department of Justice announced indictments and guilty pleas by three men in the United States responsible for creating and using Mirai, a malware strain that enslaves poorly-secured “Internet of Things” or IoT devices like security cameras and digital video recorders for use in large-scale cyberattacks. The FBI and the DOJ had help in their investigation from many security experts, but this post focuses on one expert whose research into the Dark Web and its various malefactors was especially useful in that case. Allison Nixon is director of security research at Flashpoint, a cyber intelligence firm based in New York City. Nixon spoke with KrebsOnSecurity at length about her perspectives on IoT security and the vital role of law enforcement in this fight.

Read More
SecurityTrendMicro

Why Stand-Alone IDPS Matters More Than Ever, and the 2018 Gartner Magic Quadrant

Credit to Author: Greg Young| Date: Wed, 24 Jan 2018 15:26:05 +0000

First, What is IDPS and Why Do We Care?  Intrusion Prevention Systems (IPS) emerged as an improvement on Intrusion Detection Systems (IDS).  IDS are out-of-band collectors of network traffic that analyze the information and provide alerts.  The “eureka” of IPS was that instead of just alerting, why not block what is a known attack? IPS…

Read More
MicrosoftSecurity

Now you see me: Exposing fileless malware

Credit to Author: Windows Defender ATP| Date: Wed, 24 Jan 2018 14:00:21 +0000

Attackers are determined to circumvent security defenses using increasingly sophisticated techniques. Fileless malware boosts the stealth and effectiveness of an attack, and two of last years major ransomware outbreaks (Petya and WannaCry) used fileless techniques as part of their kill chains. The idea behind fileless malware is simple: If tools already exist on a device

Read more

Read More