Incident Response In The Public Eye

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 31 Dec 2018 17:00:44 +0000

Cyberattacks happen constantly. Every day organizations are attackers online whether they realize it or not. Most of these attacks are passing affairs. The mere fact that systems are on to the internet makes them a target of opportunity. For the most part, these attacks are non-events. Security software, bugs in attack code, and updated applications…

The post Incident Response In The Public Eye appeared first on .

Read more

Q&A: Experian exec says biometrics won’t save you from mobile hacks

Credit to Author: Lucas Mearian| Date: Mon, 31 Dec 2018 03:01:00 -0800

If you think your new iPhone’s Face ID facial recognition feature or your bank’s fancy new fingerprint scanner will guarantee privacy and block hackers from accessing sensitive personal or financial data, think again.

In the coming year, cyberattacks will zero in on biometric hacking and expose vulnerabilities in touch ID sensors, facial recognition technology and passcodes, according to a new report from credit reporting agency Experian Plc. While biometric data is considered the most secure method of authentication, it can be stolen or altered, and sensors can be manipulated, spoofed or suffer deterioration with too much use.

Even so, as much as 63% of enterprises have implemented or plan to roll out  biometric authentication systems to augment or replace less-secure passwords, Experian said in its report. The push toward biometric systems dates back to the turn of the century in the financial services industry.

To read this article in full, please click here

Read more

Happy 9th Birthday, KrebsOnSecurity!

Credit to Author: BrianKrebs| Date: Sat, 29 Dec 2018 15:51:25 +0000

Hard to believe we’ve gone another revolution around the Sun: Today marks the 9th anniversary of KrebsOnSecurity.com! This past year featured some 150 blog posts, but as usual the biggest contribution to this site came from the amazing community of readers here who have generously contributed their knowledge, wit and wisdom in more than 10,000 […]

Read more

The complete story of EMOTET: Most prominent Malware of 2018

Credit to Author: Bajrang Mane| Date: Sat, 29 Dec 2018 08:28:45 +0000

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

2018: The year of the data breach tsunami

Credit to Author: Logan Strain| Date: Fri, 28 Dec 2018 16:00:00 +0000

To get a sense of the grim state of data security today, take a look at this infographic from TruthFinder that explains why 2018 was the year of the data breach tsunami.

Categories:

Tags:

(Read more…)

The post 2018: The year of the data breach tsunami appeared first on Malwarebytes Labs.

Read more

The Next Big Thing in Data Center Management for IoT, the Edge, and Big Data is Already Here

Credit to Author: Kevin Brown| Date: Thu, 27 Dec 2018 17:20:00 +0000

At the end of every year, people share predictions about the next big thing for the coming year. They examine trends and sales forecasts then form their opinions and throw… Read more »

The post The Next Big Thing in Data Center Management for IoT, the Edge, and Big Data is Already Here appeared first on Schneider Electric Blog.

Read more