Month: February 2019

MalwareBytesSecurity

Good bots, bad bots: friend or foe?

Credit to Author: Christopher Boyd| Date: Wed, 20 Feb 2019 16:00:00 +0000

Bots are an endless source of debate online, but all we ever hear about are the bad ones. In this post, we look at some examples you’ve probably already run into, and explain why one person’s good bot is another organization’s bad one.

Categories:

Tags:

(Read more…)

The post Good bots, bad bots: friend or foe? appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

A Game of Risk with Broadcasters, Cyber Felons and Dragons

Credit to Author: Trend Micro| Date: Wed, 20 Feb 2019 15:21:50 +0000

Submitted by Steve Ng, Lead, Digital Platform Operations, Mediacorp Where there’s money, there has always been crime. But what if money came in the form of intangible digital assets and crime in the form of cyber adversaries? In fantasy role-playing game Dungeons & Dragons, dragons are intelligent, mythical foes defined by their fiery prowess – boasting…

The post A Game of Risk with Broadcasters, Cyber Felons and Dragons appeared first on .

Read More
ComputerWorldIndependent

Microsoft delays Windows 7's update-signing deadline to July

Credit to Author: Gregg Keizer| Date: Tue, 19 Feb 2019 13:03:00 -0800

Microsoft has revised its schedule to dump support for an outdated cryptographic hash standard by postponing the deadline for Windows 7.

Microsoft, like other software vendors, digitally “signs” updates before they are distributed via the Internet. SHA-1 (Secure Hash Algorithm 1), which debuted in 1995, was declared insecure a decade later, but it was retained for backward-compatibility reasons, primarily for Windows 7. Microsoft wants to ditch SHA-1 and rely only on the more-secure SHA-2 (Secure Hash Algorithm 2).

Late last year, Microsoft said that it would update Windows 7 and Windows Server 2008 R2 SP1 (Service Pack 1) this month with support for SHA-2. Systems running those operating systems would not receive the usual monthly security updates after April’s collection, slated for release April 9, Microsoft promised at the time.

To read this article in full, please click here

Read More
SecuritySophos

Sophos CTO Joe Levy elected onto Cyber Threat Alliance Board of Directors

Credit to Author: Editor| Date: Tue, 19 Feb 2019 16:24:54 +0000

We&#8217;re really pleased to announce that our CTO Joe Levy has been elected onto the Cyber Threat Alliance (CTA) Board of Directors. We caught up with Joe to discuss what the CTA does, and what the appointment means to him and Sophos. Congratulations, Joe! First of all, can you talk us through what the CTA [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/zhk9LrBmGQg” height=”1″ width=”1″ alt=””/>

Read More
ComputerWorldIndependent

Yabba dabba doo!

Credit to Author: Sharky| Date: Tue, 19 Feb 2019 03:00:00 -0800

Fish is being onboarded as a software engineer and has to download the code repository and start building it. But in checking the setup guide, he can’t find any instructions on what user credentials to use to log in. This seems like something he should be able to figure out, so he trolls through multiple document systems (internal websites, Google documents and wikis) until he finds an old document that says to use his username as both username and password for version control access. That’s easy enough — but it doesn’t work. Fish gets a message saying his account wasn’t found or the password didn’t match.

Time to submit a help desk ticket. And the explanation is simple. IT had neglected to run the script that created an account for fish in the version control system. Ten minutes after submitting the ticket, fish is in at last.

To read this article in full, please click here

Read More